roycewilliams / kens-salty-rainbowLinks
An archive of descrypt hashes for common non-personal passwords
☆37Updated 2 weeks ago
Alternatives and similar repositories for kens-salty-rainbow
Users that are interested in kens-salty-rainbow are comparing it to the libraries listed below
Sorting:
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Linux startup analyzer☆65Updated last month
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆19Updated last year
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- CVE-2021-3156: Sudo heap overflow exploit for Debian 10☆51Updated 3 years ago
- ASUS wifi router RCE vulnerability☆18Updated 10 months ago
- A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).☆82Updated 3 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆90Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆37Updated 2 years ago
- POC of CVE-2023-35086 only DoS☆45Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- Simple tool/script for generating malicious Linux shared libraries☆35Updated 3 years ago
- ☆123Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆30Updated 5 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆119Updated last month
- ☆65Updated 3 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆50Updated 5 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Application Hijack Scanner for macOS☆71Updated 3 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆23Updated 6 years ago
- Linux kernel exploits for local privilege escalation☆78Updated 6 years ago