vulnserver
Exploit target
A tool designed to help developers learn how to find and exploit buffer overflow bugs in software
Vulnerable server used for learning software exploitation
1k stars
28 watching
256 forks
Language: C
last commit: about 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
firebasky/csrouge | A tool that exploits vulnerabilities in web servers to execute arbitrary code | 9 |
mssabr01/sixnet-tools | A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access | 16 |
vulnerscom/getsploit | A tool for searching and downloading exploits from various sources. | 1,726 |
billy-ellis/exploit-challenges | A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills | 898 |
sslab-gatech/pwn2own2020 | An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 402 |
hasecuritysolutions/vulnwhisperer | An aggregator tool for vulnerability scan reports from various scanners | 1,357 |
demi6od/smashing_the_browser | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
vulnreproduction/linuxflaw | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
pyroxenites/boftools | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
urule99/jsunpack-n | A tool designed to emulate browser behavior and detect vulnerabilities in web-based exploits | 162 |
vulnerscom/burp-vulners-scanner | A tool that searches for vulnerabilities in web applications using an external API | 834 |
belane/linux-soft-exploit-suggester | A script to identify vulnerabilities in software packages on Linux systems | 222 |
lockedbyte/cve-exploits | A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
lancechentw/vulnapp | An Android app demonstrating common vulnerabilities | 5 |
vysecurity/cve-2018-4878 | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |