Skip to content
#

exploit

Here are 780 public repositories matching this topic...

zachriggle
zachriggle commented Apr 28, 2020

I'm not sure what's causing this issue, but it looks like ROP.raw() does something weird when given one-byte arguments.

This happens on both Python2 and Python3.

Correct

>>> r=ROP([])
>>> r.raw(32)
>>> print(r.dump())
0x0000:             0x20
>>> r.raw(pack(32))
>>> print(r.dump())
0x0000:             0x20
0x0004:  ' \x00\x00\x00' ' \x00\x00\x00'
>>> print(hexdump(str(

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated May 24, 2020
  • Python

大型内网渗透扫描器&Cobalt Strike,包含信息收集/存活主机/IP扫描/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat、Struts2系列等,密码口令爆破含(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB、LDAP、SmbHash、WmiHash)等,可高度自定义插件支持.NET程序集、DLL(C#/Delphi/VC)、PowerShell等语言编写的插件,支持通过配置INI批量调用任意外部程序或命令,EXP生成器一键生成Web漏洞POC,可快速扩展扫描或利用能力。支持Cobalt Strike 3.X-4.0

  • Updated May 3, 2020
  • C#
richardsedai
richardsedai commented Aug 3, 2019

I've tried launching this from the .exe in the zip file download and by installing it via the Installer.msi both keep giving me the "not a valid Win32 application" message shown in the screenshot attached here. I'm running Windows XP on Parallels Desktop 14 on a Mac Mini with a 3GHz Intel Core i7 and 16GB of RAM so it isn't an issue of hardware compatibility or at least it shouldn't be. If anyone

Improve this page

Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.