All Projects → deadbits → Insecureprogramming

deadbits / Insecureprogramming

mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Insecureprogramming

Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+168.12%)
Mutual labels:  exploitation, security-vulnerability
Binexp
Linux Binary Exploitation
Stars: ✭ 742 (+224.02%)
Mutual labels:  exploitation, vulnerabilities
Exploit Writeups
A collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (+195.2%)
Mutual labels:  exploitation, vulnerabilities
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-87.34%)
Mutual labels:  security-vulnerability, exploitation
Hacksysextremevulnerabledriver
HackSys Extreme Vulnerable Windows Driver
Stars: ✭ 1,330 (+480.79%)
Mutual labels:  exploitation, vulnerabilities
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-73.36%)
Mutual labels:  vulnerabilities, exploitation
Brakeman
A static analysis security vulnerability scanner for Ruby on Rails applications
Stars: ✭ 6,281 (+2642.79%)
Mutual labels:  vulnerabilities, security-vulnerability
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+217.9%)
Mutual labels:  exploitation, security-vulnerability
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+3762.01%)
Mutual labels:  vulnerabilities, security-vulnerability
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+3285.15%)
Mutual labels:  exploitation, vulnerabilities
DrGadget
dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (-73.36%)
Mutual labels:  vulnerabilities, exploitation
Vulnerable Kext
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (-17.9%)
Mutual labels:  exploitation, vulnerabilities
exploits
Some of my public exploits
Stars: ✭ 50 (-78.17%)
Mutual labels:  security-vulnerability, exploitation
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+80.35%)
Mutual labels:  vulnerabilities, security-vulnerability
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-44.54%)
Mutual labels:  vulnerabilities, exploitation
Ossa
Open-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+247.6%)
Mutual labels:  vulnerabilities, security-vulnerability
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-50.22%)
Mutual labels:  exploitation, vulnerabilities
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-45.41%)
Mutual labels:  exploitation, vulnerabilities
Sbt Dependency Check
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (-18.34%)
Mutual labels:  vulnerabilities
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-13.1%)
Mutual labels:  exploitation

Say Thanks

InsecureProgramming

This is a mirror of Gera's Insecure Programming examples. Olds but great for begginers getting into the basics of exploitation techniques and vulnerabilities.

Original Source

http://community.coresecurity.com/~gera/InsecureProgramming/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].