twosixlabs / acsploitLinks
A tool for generating worst-case inputs to commonly used algorithms
☆121Updated 2 years ago
Alternatives and similar repositories for acsploit
Users that are interested in acsploit are comparing it to the libraries listed below
Sorting:
- ☆252Updated 4 years ago
- ☆232Updated 6 years ago
- A fuzzing framework for network servers☆118Updated 7 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- Python automation of Docker.sock abuse☆211Updated 2 years ago
- collection of verified Linux kernel exploits☆190Updated 4 years ago
- ☆273Updated 2 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 8 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆127Updated 6 months ago
- Fuzz testing: Beginner's guide☆76Updated last year
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- ☆23Updated 5 years ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- BSidesSF CTF 2019 release☆72Updated 2 years ago
- research☆151Updated last year
- TLS Redirection☆120Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆183Updated 5 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆405Updated 2 years ago
- Finding potential software vulnerabilities from git commit messages☆417Updated 2 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆201Updated 6 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆207Updated 6 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆83Updated 8 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 8 years ago
- ☆28Updated 6 years ago
- OpenAPI 2.0 (Swagger) fuzzer written in python. Basically TnT for your API.☆110Updated 2 years ago