teletautala / fullypwndLinks
This program is designed to identify operating system and running services and find exploits for those services and attempt to connect. I wanted that when the program finishes it's scan there was a way to report, annotate and clarify data.
☆16Updated 12 years ago
Alternatives and similar repositories for fullypwnd
Users that are interested in fullypwnd are comparing it to the libraries listed below
Sorting:
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- ☆19Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 11 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 8 years ago
- A fuzz job for ClamAV☆31Updated 9 years ago
- quals-2014☆22Updated 10 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- CTF exploit development and other tools of pwnage☆21Updated 6 years ago
- ☆22Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Windows 8.1 + IE 11 Exploit☆18Updated 8 years ago