Proof of Concept code for CVE-2016-5696
☆102Aug 24, 2016Updated 9 years ago
Alternatives and similar repositories for rover
Users that are interested in rover are comparing it to the libraries listed below
Sorting:
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- Tools for 802.11 information gathering.☆119May 9, 2022Updated 3 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- ☆79May 13, 2016Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325May 9, 2016Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- ☆49Jul 5, 2016Updated 9 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Proof-of-concept exploit code for CVE-2016-5696☆75Aug 30, 2016Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- ☆111May 16, 2017Updated 8 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- ☆19Mar 24, 2017Updated 8 years ago