Proof of concepts of attacks against Wi-Fi implementations
☆143Oct 12, 2018Updated 7 years ago
Alternatives and similar repositories for blackhat17-pocs
Users that are interested in blackhat17-pocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- ☆1,329May 25, 2023Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Modified drivers to reliably perform fragmentation and aggregation vulnerability tests☆12Jan 7, 2023Updated 3 years ago
- ☆486Oct 18, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆18Jan 27, 2018Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆306Jan 12, 2023Updated 3 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- ☆3,495Dec 25, 2024Updated last year
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python Scanner for "ShellShock" (CVE-2014-6271)☆46Sep 29, 2014Updated 11 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Blackhat 2012 Sample Codes☆95Jul 13, 2016Updated 9 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generate HTTPS reports based on scan data☆15Updated this week
- ☆14May 13, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Encrypting VHD parser driver for Hyper-V☆10Apr 22, 2016Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- ☆47Apr 9, 2026Updated last week
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago