A collection of toy programs for teaching buffer overflow vulnerabilities.
☆55Nov 23, 2015Updated 10 years ago
Alternatives and similar repositories for stacksmash
Users that are interested in stacksmash are comparing it to the libraries listed below
Sorting:
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Browser-based Playstation Emulator☆16Feb 14, 2016Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Gates of Olympus: A multi-layer tower defense game in WebGL☆15Jan 30, 2011Updated 15 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Online Summarization Algorithm for Twitter Streams - supporting code for an EACL 2014 paper☆16Feb 25, 2014Updated 12 years ago
- Worms / Tanks HTML5 Pixel Perfect Destructible Terrain☆21Jan 29, 2012Updated 14 years ago
- WebGL Library that explores architectural challenges in software design☆16Feb 19, 2016Updated 10 years ago
- Network streaming of kinect depth data using gstreamer to southcast servers☆15Oct 25, 2011Updated 14 years ago
- A WebGL reimagination of Stunts.☆15Aug 25, 2011Updated 14 years ago
- Crawl and render JavaScript templates.☆10May 20, 2018Updated 7 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Open source platform for multiplayer HTML5 games☆80Apr 18, 2012Updated 13 years ago
- Uses Node.js and Leap Motion to control an AR Drone and stream video to the browser.☆62Nov 20, 2013Updated 12 years ago
- Trade stocks with virtual money☆14May 6, 2014Updated 11 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- This is an OS X Privilege escalation exploit. The Payload function of this exploit is sending a root shell. Change the IP and the destina…☆34Dec 16, 2016Updated 9 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago