-
Updated
May 14, 2020
exploit
Here are 789 public repositories matching this topic...
-
Updated
Jun 9, 2020 - Python
The Chinese translated version of the README is well out of date, last updated 2 years ago.
The current English README needs to be translated to replace this old one, or to be removed.
.github\.translations\README-zh.md
README translations
-
Updated
Oct 26, 2019 - C
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to [this](https://gist.github.com/frohoff/24af7913611f8406ea
-
Updated
Jun 7, 2020 - Python
-
Updated
Apr 22, 2020
-
Updated
Jun 8, 2020 - PowerShell
-
Updated
Jun 7, 2020 - C#
-
Updated
May 22, 2020 - Lua
-
Updated
Jan 21, 2020 - Python
-
Updated
Sep 7, 2018 - JavaScript
-
Updated
Nov 19, 2019 - JavaScript
-
Updated
Mar 30, 2020 - C
-
Updated
May 21, 2017 - Python
-
Updated
Feb 21, 2019 - Python
-
Updated
Apr 8, 2020 - C
-
Updated
Nov 2, 2018 - Python
I feel like our IPC API can take a little getting used to, and there is very little public documentation; pretty much all anyone has to go off of are the few included scripts.
-
Updated
Jun 1, 2020 - Python
Invalid method
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
I've tried launching this from the .exe in the zip file download and by installing it via the Installer.msi both keep giving me the "not a valid Win32 application" message shown in the screenshot attached here. I'm running Windows XP on Parallels Desktop 14 on a Mac Mini with a 3GHz Intel Core i7 and 16GB of RAM so it isn't an issue of hardware compatibility or at least it shouldn't be. If anyone
Improve this page
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."
The
constgreptool could probably be a bit faster. I'm not sure what's making it so slow at the moment. It shouldn't take ~2 seconds to look up a value.