PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure
☆65Aug 1, 2015Updated 10 years ago
Alternatives and similar repositories for cve-2015-5477
Users that are interested in cve-2015-5477 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆16Nov 16, 2015Updated 10 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- ☆20Mar 6, 2015Updated 11 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Oct 27, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Mar 5, 2021Updated 5 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- ELF header abuse☆50Mar 23, 2016Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 10 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- CVE-2014-3153 aka towelroot☆123Apr 25, 2017Updated 8 years ago
- ☆79May 13, 2016Updated 9 years ago
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Mar 8, 2015Updated 11 years ago