tacnetsol / TRENDNetExploitsLinks
Exploits for TRENDNet routers
☆13Updated 5 years ago
Alternatives and similar repositories for TRENDNetExploits
Users that are interested in TRENDNetExploits are comparing it to the libraries listed below
Sorting:
- Cisco IOS Exploit Framework☆22Updated 6 years ago
- Main repository to pull all Cisco related projects.☆16Updated 8 years ago
- ☆17Updated 7 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 9 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- upstream for seccheck☆15Updated 7 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Copy of the contents at phrack.com☆41Updated 10 months ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 7 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Plugins and signatures☆13Updated 6 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- A curated list of awesome Cisco exploitation resources☆70Updated 8 years ago