ps1337 / pcap-mitm-fuzz0r
Fuzz servers and clients using pcaps or mitm based approaches
☆9Updated 5 years ago
Alternatives and similar repositories for pcap-mitm-fuzz0r:
Users that are interested in pcap-mitm-fuzz0r are comparing it to the libraries listed below
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- Exploits I've authored☆60Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- An opensource API hooking framework☆21Updated 5 years ago
- Dwarf script to collect network requests and display on data panel☆21Updated 4 years ago
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆48Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- ☆14Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆17Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- ☆22Updated 4 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆21Updated last year
- An unauthenticated PoC for CVE-2020-0796☆21Updated 4 years ago
- Rekall Memory Forensic Framework☆31Updated 5 years ago
- ☆10Updated 3 years ago