stealth / troubleshooter
setroubleshootd xSports
☆92Updated 7 years ago
Alternatives and similar repositories for troubleshooter:
Users that are interested in troubleshooter are comparing it to the libraries listed below
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆67Updated 11 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆103Updated 4 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- ☆137Updated 7 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Implementation of the SMM rootkit "The Watcher"☆125Updated 3 years ago
- ☆38Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Hodor! Fuzzer..☆128Updated 8 years ago
- ☆79Updated 8 years ago
- ☆17Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 9 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- ☆112Updated 7 years ago
- Wolves Among the Sheep☆147Updated last year
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆35Updated 5 years ago
- GDB commands to aid exploit development☆45Updated 8 years ago
- ☆73Updated 2 years ago