ztgrace / pwn_labView external linksLinks
☆90Sep 18, 2017Updated 8 years ago
Alternatives and similar repositories for pwn_lab
Users that are interested in pwn_lab are comparing it to the libraries listed below
Sorting:
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 3 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- ☆29Mar 31, 2017Updated 8 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Jan 24, 2017Updated 9 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆323Aug 20, 2017Updated 8 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- X41 Browser Security White Paper - Tools and PoCs☆183Sep 29, 2017Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62May 8, 2017Updated 8 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12May 2, 2016Updated 9 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- Windows Console Monitoring☆103Sep 13, 2017Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago