teletautala / fullypwnd
This program is designed to identify operating system and running services and find exploits for those services and attempt to connect. I wanted that when the program finishes it's scan there was a way to report, annotate and clarify data.
☆16Updated 12 years ago
Alternatives and similar repositories for fullypwnd:
Users that are interested in fullypwnd are comparing it to the libraries listed below
- Offline Security Focus Database☆31Updated 12 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 11 years ago
- Slides & Video Demos of My Talk Titled Browser Exploits? Grab ’em by the Collar! @ Brucon0x09Updated 7 years ago
- ☆22Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- ☆19Updated 11 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 7 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- ☆12Updated 7 years ago
- ☆21Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆43Updated 10 years ago
- CTF exploit development and other tools of pwnage☆21Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- BlazeFox Exploit☆18Updated 6 years ago