pk-man / Bash-Integer-Overflow
Bash integer overflow in braces
☆11Updated 9 years ago
Alternatives and similar repositories for Bash-Integer-Overflow
Users that are interested in Bash-Integer-Overflow are comparing it to the libraries listed below
Sorting:
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Chrome extension for blocking x-origin cookies☆11Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- ☆15Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- Yara Plugin for Binary Ninja☆13Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆15Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆27Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- ☆17Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago