rcoh / stacksmashView external linksLinks
A collection of toy programs for teaching buffer overflow vulnerabilities.
☆55Nov 23, 2015Updated 10 years ago
Alternatives and similar repositories for stacksmash
Users that are interested in stacksmash are comparing it to the libraries listed below
Sorting:
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- This is an OS X Privilege escalation exploit. The Payload function of this exploit is sending a root shell. Change the IP and the destina…☆34Dec 16, 2016Updated 9 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- ☆12May 9, 2017Updated 8 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Apr 13, 2016Updated 9 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- List of penetration testing tools.☆23Mar 25, 2020Updated 5 years ago
- Advanced buffer overflow and memory corruption security challenges☆190Feb 18, 2022Updated 3 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago