original cve-2013-2094 exploit and a rewritten version for educational purposes
☆91May 21, 2013Updated 12 years ago
Alternatives and similar repositories for cve-2013-2094
Users that are interested in cve-2013-2094 are comparing it to the libraries listed below
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Get your latitude/longitude via wifi access points☆15Sep 25, 2012Updated 13 years ago
- One of the fastest binary format for JSON-like data.☆12Dec 13, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆98Jun 18, 2014Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- A simple, unofficial Todoist extension for Gnome shell which shows the count of open tasks in the top right corner of your screen. Also l…☆13Dec 23, 2022Updated 3 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Vulnerability Verification Environment based on Docker☆111Jun 17, 2019Updated 6 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- ☆20Mar 3, 2016Updated 10 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- TinySHell port to SCTP☆131Oct 19, 2013Updated 12 years ago