vanhoefm / papers
☆45Updated last week
Related projects ⓘ
Alternatives and complementary repositories for papers
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- All related files and slides for past talks☆44Updated last year
- ☆15Updated 8 years ago
- Bluetooth PIN and LINK-KEY Cracker☆47Updated 10 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- ☆14Updated 3 years ago
- ☆13Updated 7 years ago
- ☆20Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- a 802.11 wireless fuzzer☆90Updated 11 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆79Updated 11 years ago