aspcode堆溢出利用代码
☆53May 17, 2015Updated 10 years ago
Alternatives and similar repositories for aspcode
Users that are interested in aspcode are comparing it to the libraries listed below
Sorting:
- A php webshell run under linux based webservers. v0.05☆47Feb 17, 2015Updated 11 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Slides and demos☆48Mar 24, 2015Updated 10 years ago
- Php Codz Hacking☆669Sep 5, 2015Updated 10 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- RCS Anonymizer☆20May 24, 2021Updated 4 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- A simple regular-expression based DNS server☆22Apr 21, 2015Updated 10 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Jan 25, 2016Updated 10 years ago
- hash dump tool☆26May 10, 2016Updated 9 years ago
- ☆14May 13, 2018Updated 7 years ago
- Lightweight rootkit implemented by bash shell scripts v0.10☆575Sep 12, 2017Updated 8 years ago
- wyscan tor proxy lib & help doc☆35Apr 3, 2015Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.☆10Oct 30, 2016Updated 9 years ago
- 知道创宇研发技能表☆844Aug 23, 2024Updated last year
- A training course for BambooFox☆25Mar 18, 2016Updated 10 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerabi…☆153Jan 6, 2016Updated 10 years ago
- 针对域名/页面的接口爬取,递归模式入库☆22Sep 18, 2019Updated 6 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Simple chat app using grpc☆10May 31, 2016Updated 9 years ago
- OpenSource My ImageMagick Fuzzer ..☆298Jul 26, 2017Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Nov 7, 2017Updated 8 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Sep 4, 2015Updated 10 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- Graduation Project.☆19Jul 24, 2015Updated 10 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆85Aug 2, 2021Updated 4 years ago