sophieschmieg / exploitsLinks
☆13Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- A Platform for Testing Secure Coding/Config☆19Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆49Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 10 months ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- The Multiplatform Linux Sandbox☆16Updated last year
- ☆20Updated 3 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- QL Workshop☆16Updated 5 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆28Updated 2 years ago
- ☆20Updated 11 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Format string exploitation helper☆45Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- Detect patterns of bad behavior in function calls☆25Updated 5 years ago
- ☆25Updated 2 weeks ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 4 years ago
- ☆52Updated 6 years ago
- go reversing helpers for binaryninja☆30Updated 2 years ago