Materials for 44con 2014 CANAPE Workshop
☆23Sep 11, 2014Updated 11 years ago
Alternatives and similar repositories for 44con_2014
Users that are interested in 44con_2014 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 9, 2015Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- libtalloc is a python script for use with GDB that can be used to analyse the "trivial allocator" (talloc)☆17Aug 6, 2015Updated 10 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Recordization library☆11Mar 11, 2026Updated last week
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- A network proxy library written in C# for .NET Core based on CANAPE☆191Aug 19, 2023Updated 2 years ago
- CANAPE Network Testing Tool☆184Jan 18, 2018Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- A Tool For Importing the Blitcoin Blockchain into the Neo4j Graph Database☆20Jul 8, 2013Updated 12 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆142Apr 21, 2017Updated 8 years ago