xlucas / dirtycow.crView external linksLinks
CVE-2016-5195 exploit written in Crystal
☆13Oct 25, 2016Updated 9 years ago
Alternatives and similar repositories for dirtycow.cr
Users that are interested in dirtycow.cr are comparing it to the libraries listed below
Sorting:
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- ಠ_ಠ The most disapproving coding language on the Internet.☆10Nov 4, 2015Updated 10 years ago
- a git implementation in rust. yeah, I know..☆12Jun 10, 2016Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Java Library for Generating x86 Code☆12Sep 30, 2019Updated 6 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- A stack-based, interpreted programming language implemented in livescript.☆10Sep 11, 2016Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- A Python interpreter for the huh? programming language.☆10Mar 1, 2018Updated 7 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- 浙江大学软件学院(srun3000)上网认证☆11Nov 28, 2016Updated 9 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆17May 2, 2024Updated last year
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- The official Github Repo and Download for the FNAF Mod☆10Nov 10, 2015Updated 10 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- A language for matching two-dimensional patterns, based on Boolean grammars.☆13Feb 4, 2018Updated 8 years ago
- A rewrite of the famed Cardinal☆14Jan 29, 2017Updated 9 years ago
- http://mroman.ch/burlesque☆14Dec 26, 2019Updated 6 years ago
- Experimental Windows .text section Patch Detector☆22Jan 26, 2015Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 10 years ago
- Indev golfing language☆18Jul 9, 2020Updated 5 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- MIRROR of https://codeberg.org/catseye/ALPACA : A Language for the Pithy Articulation of Cellular Automata☆23Oct 27, 2023Updated 2 years ago
- Copy of Fresh Onions is an open source TOR spider / hidden service onion crawler☆30Jan 5, 2021Updated 5 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago