phikshun / ufuzz
Universal Plug and Fuzz
☆41Updated 5 years ago
Alternatives and similar repositories for ufuzz:
Users that are interested in ufuzz are comparing it to the libraries listed below
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- ☆74Updated 2 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- PoC implementation of the POODLE attack☆68Updated 9 years ago
- ☆20Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Some tools used in the Ruxcon / Kiwicon /SECT-T presentation "Breaking Bricks and Plumbing Pipes: Cisco ASA a Super Mario Adventure."☆63Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago