tacnetsol / TRENDNetExploits
Exploits for TRENDNet routers
☆13Updated 5 years ago
Alternatives and similar repositories for TRENDNetExploits:
Users that are interested in TRENDNetExploits are comparing it to the libraries listed below
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Cisco IOS Exploit Framework☆21Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- ☆17Updated 6 years ago
- ☆13Updated 4 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- ☆16Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- Execute system calls over the network☆11Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Presentations from the CX Security Labs team☆33Updated 6 months ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆13Updated 9 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Mips Overflow Writer - Quickly write MIPS big/little overflows.☆10Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago