realtalk / cve-2013-2094View external linksLinks
original cve-2013-2094 exploit and a rewritten version for educational purposes
☆91May 21, 2013Updated 12 years ago
Alternatives and similar repositories for cve-2013-2094
Users that are interested in cve-2013-2094 are comparing it to the libraries listed below
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 9 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆97Jun 18, 2014Updated 11 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Get your latitude/longitude via wifi access points☆15Sep 25, 2012Updated 13 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago