vanhoefm / blackhat17-pocsView external linksLinks
Proof of concepts of attacks against Wi-Fi implementations
☆143Oct 12, 2018Updated 7 years ago
Alternatives and similar repositories for blackhat17-pocs
Users that are interested in blackhat17-pocs are comparing it to the libraries listed below
Sorting:
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆13Feb 25, 2014Updated 11 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- ☆1,329May 25, 2023Updated 2 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Jan 12, 2023Updated 3 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- Toy project for static analysis of ELF binaries☆29Jun 24, 2017Updated 8 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Sep 29, 2014Updated 11 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 5 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 7 months ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- ☆483Oct 18, 2025Updated 3 months ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- ☆3,487Dec 25, 2024Updated last year
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- ☆24Apr 11, 2017Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago