Tag: exploits

Penetration Testing

Exploits – Advisories

Offensive Security’s Exploit Database Archive The Exploit Database – ultimate archive of Exploits, Shellcode, and Security Papers. Packet Storm Security Exploits and Advisories A list of exploits, advisories, tools and more. Securityfocus Vulnerabilities Search for vulnerabilities. National Vulnerability Database NVD is the U.S. government repository of standards based vulnerability management data represented using the Security …

Hacking, Penetration Testing

Exploit Database – a repository for exploits and PoCs

The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit …

Exploits, Fuzzing

Security oriented open source fuzzer

American fuzzy lop is a security-oriented fuzzer that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary. This substantially improves the functional coverage for the fuzzed code. The compact synthesized corpora produced by the tool are also useful …

Exploitation, Hacking, OpenVAS, Penetration Testing

Quick OpenVAS setup

Open a terminal on your Kali host. Installation – Configuration openvas-setupopenvas-setup openvas-scapdata-syncopenvas-scapdata-sync openvas-certdata-syncopenvas-certdata-sync Change admin password openvasmd –user=admin –new-password=newpasswordopenvasmd –user=admin –new-password=newpassword Run openvas-startopenvas-start Open your browser and visit the address:

Exploits, Malware Analysis, Reverse Engineering

Write exploits, analyze malware, and reverse engineer binary files

Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry’s first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility. Overview A debugger with functionality designed …