nickboucher / trojan-source
Trojan Source: Invisible Vulnerabilities
☆1,252Updated last year
Alternatives and similar repositories for trojan-source:
Users that are interested in trojan-source are comparing it to the libraries listed below
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆786Updated 2 years ago
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing☆646Updated 4 months ago
- ☆2,079Updated 3 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆806Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆1,052Updated 2 years ago
- Portable Executable reversing tool with a friendly GUI☆2,961Updated 3 weeks ago
- ☆1,490Updated 2 years ago
- ☆2,498Updated 2 years ago
- Showcasing what in-app browsers do under the hood☆473Updated 2 years ago
- OFRAK: unpack, modify, and repack binaries.☆1,930Updated this week
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆687Updated 2 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,708Updated 3 years ago
- ☆1,115Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,922Updated 2 years ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,291Updated this week
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 2 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,389Updated 8 months ago
- iPhone 11 emulated on QEMU☆2,033Updated 2 years ago
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- Repository for information about 0-days exploited in-the-wild.☆781Updated last week
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,826Updated 11 months ago
- Open Source Package Analysis☆823Updated 2 weeks ago
- Connect like there is no firewall. Securely.☆1,652Updated this week
- ☆445Updated 2 years ago
- ☆1,262Updated last month
- A JavaScript Engine Fuzzer☆1,971Updated last month
- PoC exploits for software vulnerabilities☆678Updated 3 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 3 years ago
- Credentials Dumper for Linux using eBPF☆1,136Updated 6 months ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,066Updated 3 years ago