origami is a Ruby framework designed to parse, analyze, edit, manipulate, forge, exploit PDF files. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and/or analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.
03d625dd6742e83e1cf1e7aada8ac8204c837386922d724032600a741c8dd32d
origami is a Ruby framework designed to parse, analyze, edit, manipulate, forge, exploit PDF files. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and/or analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.
7405bfc439b78efdaa51fa0a0e50f65ec3a0fa667d5346b12c0813e56d269d1f
Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.
6e1c98ff5396dd2d1c95a0d8f08f85e51cf05b1ed85ea7b5bcf73c4ca5d301dd
tcpdump bgp_update_print() remote denial of service exploit.
4810de4822c6a55a2bce7e84d2e9bfa8cc8e2d2d326358b2a4c20541d4da4bc4
Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.
b7f60d991af47dd4d8ab5d1b66a5ad577cea56280802a585b722deea083f3855
Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.
bd0b28f03cfe68cc4a98700d4f1ed47e8ecac6cc16fd17b73a9ebbd997ba11e6
Libfmtb v0.3 is a library with lots of functions for easily exploiting local and remote format string vulnerabilities.
75cb87287ef8777dfe7fccd084fd8a318fd10c069624afe34f229bf59951117e
How to Remotely Exploit Format String Bugs - A practical tutorial. Includes info on guessing the offset, guessing the address of the shellcode in the stack, using format string bugs as debuggers, examples, etc.
c323add4e7a0e2f2f14ec27d9d50002992564b1d0be3d391722da88350a25a83
Format String Builder includes code and instructions for use of a program which aids in the creation of format string exploits. Includes fmtbuilder.c, a small program to help build the strings.
848aaf31d3d81b8a782d44737935a4b9fcbae59484032cc55cdd1d2a44e1e406