Proof of concepts of attacks against Wi-Fi implementations
☆143Oct 12, 2018Updated 7 years ago
Alternatives and similar repositories for blackhat17-pocs
Users that are interested in blackhat17-pocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- ☆1,329May 25, 2023Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Modified drivers to reliably perform fragmentation and aggregation vulnerability tests☆12Jan 7, 2023Updated 3 years ago
- ☆485Oct 18, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆18Jan 27, 2018Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆305Jan 12, 2023Updated 3 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- ☆3,496Dec 25, 2024Updated last year
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Sep 29, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Feb 19, 2017Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Blackhat 2012 Sample Codes☆95Jul 13, 2016Updated 9 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- 2018 BlackHat Tools List☆388Sep 7, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Generate HTTPS reports based on scan data☆15Updated this week
- ☆14May 13, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Encrypting VHD parser driver for Hyper-V☆10Apr 22, 2016Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- ☆46Feb 18, 2026Updated last month
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago