aspcode堆溢出利用代码
☆53May 17, 2015Updated 10 years ago
Alternatives and similar repositories for aspcode
Users that are interested in aspcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Slides and demos☆48Mar 24, 2015Updated 11 years ago
- Php Codz Hacking☆670Sep 5, 2015Updated 10 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DEPRECATED☆24Feb 22, 2021Updated 5 years ago
- ☆23Jun 2, 2017Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- A simple regular-expression based DNS server☆22Apr 21, 2015Updated 10 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Jan 25, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Apply hot patches for running processes without restarting☆13Jun 1, 2020Updated 5 years ago
- hash dump tool☆26May 10, 2016Updated 9 years ago
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Sep 12, 2017Updated 8 years ago
- mruby VM implementation in 2KB ROM☆10May 7, 2019Updated 6 years ago
- wyscan tor proxy lib & help doc☆35Apr 3, 2015Updated 11 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.☆10Oct 30, 2016Updated 9 years ago
- A training course for BambooFox☆25Mar 18, 2016Updated 10 years ago
- low cost NXP cortex A7 Linux Yocto tbox☆23Apr 9, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- From RD to Vulnerability Research☆68Jun 10, 2020Updated 5 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerabi…☆153Jan 6, 2016Updated 10 years ago
- 针对域名/页面的接口爬取,递归模式入库☆22Sep 18, 2019Updated 6 years ago
- C/C++ source code for Software Tools in Pascal by Kernighan and Plauger☆19Jan 20, 2020Updated 6 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Proof of Concept of HID26 Bruteforce☆30Nov 20, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- OpenSource My ImageMagick Fuzzer ..☆298Jul 26, 2017Updated 8 years ago
- xmservice☆10May 28, 2020Updated 5 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Nov 7, 2017Updated 8 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Sep 4, 2015Updated 10 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago