sophieschmieg / exploitsLinks
☆13Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- The Multiplatform Linux Sandbox☆16Updated last year
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- ☆20Updated 3 years ago
- Fuzz Network Traffic☆18Updated 8 months ago
- go reversing helpers for binaryninja☆29Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- QL Workshop☆16Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆49Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆25Updated 5 months ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- ☆64Updated last year
- ☆20Updated 11 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago