-
-
fidius-evasiondb
... > m = FIDIUS::EvasionDB::Knowledge::AttackModule.first
=> #exploit/windows/smb/ms08_067_netapi", options_hash: "4d70ba1e95523e6d602e316a2553decf", finished: true, created_at: "2011-04-02 13:43: ...
-
sclog
... try to probe
deeper into shellcodes which expect there to be an open file handle in memory
to the original file that is triggering the exploit. The main way i have seen
this done so far, is for the shellcode to call GetFileSize(x) over and over again
as ...
-
p5-Algorithm-Diff-Fast
... released under the MIT license. The "low
level" functions in Algorithm::Diff::Fast are a rewrite of those in
Algorithm::Diff to exploit this new core system. The object-oriented API
(which looks on the clunky side to me) is a straight port from Algorithm ...
-
select
... are not specialized in the "no
auto-boxing" sense (ie. @specialized), but rather they use the natural order
of these types and exploit the fact that Java's underlying type system keeps
Array's type parameters. That is, while List[Int] becomes just a List ...
-
learning-lisp
... Brownlee to learn ANSI Common LISP.
h2. Objectives
* To become competent enough in ANSI Common LISP to be able to exploit it for ad hoc software development projects.
* Explore some espoused and advanced features, such as:
** macros
** dynamic code ...
-
PadBuster
... .Rizzo and T.Duong for providing proof of concept web exploit
techniques and S.Vaudenay for initial discovery of the ... M. Martin (research@esptl.com) for sharing proof of concept exploit
code for performing various brute force attack techniques.
PadBuster ...
-
VS_LIBEMU
... of the sctest project, that includes more hooks, interactive debugging, reporting features, and ability to work with file format exploit shellcode. Will run under WINE
This project is a port of the GCC libemu project to compile with
Visual Studio ...
-
stackjacking
... "Stackjacking Your Way to grsec/PaX Bypass"
/****************************************************************************
* Stackjacking:
* A grsecurity/PaX exploit framework
*
* As demonstrated at Hackito Ergo Sum and Immunity INFILTRATE, April 2011 ...
-
netcat
... a unix box around to use tools such as Netcat or to test their systems
with the unix version of an NT vulnerability exploit. With Netcat for NT
part of that feeling disempowerment is over.
Included with this release is Hobbit's original description of ...
-
proman_mmxii
... " web application in late May 2009. Proman MMXII is the third generation of this application, rebuilt from the ground up to exploit the latest innovations in modern Rails application development and to correct some of the major deficiencies of the first ...
-