NTPD remote DOS exploit and vulnerable container
☆25Oct 30, 2017Updated 8 years ago
Alternatives and similar repositories for exploit-CVE-2016-7434
Users that are interested in exploit-CVE-2016-7434 are comparing it to the libraries listed below
Sorting:
- Dockerized Transmission, the most popular opensource Torrent Client☆12Nov 1, 2017Updated 8 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Oct 30, 2017Updated 8 years ago
- Black Nurse DOS attack☆70Oct 30, 2017Updated 8 years ago
- Blacklist ip addresses caught scanning or bruteforcing hosts☆20Jan 6, 2019Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- phpldapadmin remote exploit and vulnerable container !☆13Nov 9, 2018Updated 7 years ago
- Spectre exploit☆54Jan 9, 2018Updated 8 years ago
- A curated list of free public proxy servers☆72Jan 6, 2019Updated 7 years ago
- Docker image to test HTTP load balancers☆35Dec 22, 2019Updated 6 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- ☆12May 24, 2015Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Easily setup a hidden service inside the Tor network☆173Nov 2, 2023Updated 2 years ago
- XMrig miner in a container !☆14Dec 19, 2021Updated 4 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Mar 16, 2023Updated 2 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- OpenSSH 7.7 - Username Enumeration☆17Oct 23, 2020Updated 5 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago