sophieschmieg / exploitsLinks
☆13Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- The Multiplatform Linux Sandbox☆16Updated last year
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- ☆25Updated last month
- General Research Repository - Only updated when I feel like it☆28Updated 11 months ago
- Network Traffic Fuzzer☆18Updated 9 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆49Updated 4 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- QL Workshop☆16Updated 6 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆12Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- ☆48Updated last month
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Writeups of CTF challenges I do☆13Updated 6 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆28Updated 2 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago