tacnetsol / TRENDNetExploitsLinks
Exploits for TRENDNet routers
☆13Updated 5 years ago
Alternatives and similar repositories for TRENDNetExploits
Users that are interested in TRENDNetExploits are comparing it to the libraries listed below
Sorting:
- Cisco IOS Exploit Framework☆21Updated 5 years ago
- ☆17Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Abusing the FreeBSD MAC framework for rootkits☆11Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Plugins and signatures☆14Updated 6 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- ☆12Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Seed Corpus for clamav-devel oss-fuzz integration.☆32Updated 5 years ago