yunuscadirci / CallStranger
Vulnerability checker for Callstranger (CVE-2020-12695)
☆404Updated 3 years ago
Alternatives and similar repositories for CallStranger:
Users that are interested in CallStranger are comparing it to the libraries listed below
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆798Updated 2 years ago
- ☆1,257Updated last week
- Scanner for CVE-2020-0796 - SMBv3 RCE☆674Updated 4 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆475Updated 4 years ago
- ☆604Updated 2 years ago
- a tool to analyze filesystem images for security☆498Updated last year
- ☆220Updated 5 years ago
- the Network Protocol Fuzzer that we will want to use.☆740Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆823Updated 3 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358Updated 8 months ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 4 years ago
- Attify OS - Distro for pentesting IoT devices☆966Updated 3 years ago
- EMBArk - The firmware security scanning environment☆328Updated this week
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- A network packet forensics tool for SSH☆255Updated 4 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- Firmware Analysis and Comparison Tool☆1,296Updated this week
- Python automation of Docker.sock abuse☆211Updated 2 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆713Updated last month
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆370Updated 5 years ago
- Script for searching the extracted firmware file system for goodies!☆1,096Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year
- A simple embedded Linux backdoor.☆195Updated 4 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 2 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆361Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 4 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆324Updated 4 months ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆638Updated 5 years ago
- Web-based reverse shell generator☆172Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year