A simple script for discovery and analysis of UPnP servers
☆177Nov 29, 2022Updated 3 years ago
Alternatives and similar repositories for upnp_info
Users that are interested in upnp_info are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- A Upnp exploitation tool.☆105Oct 27, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Aug 4, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- UPnP hacking scripts and tools☆77Jan 14, 2017Updated 9 years ago
- Packet capture sanitizer/anonymizer.☆25Jan 29, 2023Updated 3 years ago
- Filet-O-Firewall Vulnerability PoC☆61Sep 4, 2015Updated 10 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Materials of Workshop presented at DEFCON 25☆107Jul 29, 2017Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 9 years ago
- UPnP Pentest Toolkit for Windows☆261Nov 13, 2014Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Aug 24, 2019Updated 6 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Small script to determine valid immediate values for ARM assembly☆19Nov 25, 2019Updated 6 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- Cable modem firmware dump☆41Jun 30, 2015Updated 10 years ago
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- ☆10Feb 9, 2015Updated 11 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- A specific SSDP Scanner for the SSDP Attack Script☆11Sep 6, 2014Updated 11 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago