-
Updated
May 14, 2020
exploit
Here are 780 public repositories matching this topic...
-
Updated
May 24, 2020 - Python
The Chinese translated version of the README is well out of date, last updated 2 years ago.
The current English README needs to be translated to replace this old one, or to be removed.
.github\.translations\README-zh.md
README translations
-
Updated
Oct 26, 2019 - C
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to [this](https://gist.github.com/frohoff/24af7913611f8406ea
-
Updated
May 19, 2020 - Python
-
Updated
Apr 22, 2020
-
Updated
May 2, 2020 - PowerShell
-
Updated
May 3, 2020 - C#
-
Updated
May 22, 2020 - Lua
-
Updated
Jan 21, 2020 - Python
-
Updated
Sep 7, 2018 - JavaScript
-
Updated
Nov 19, 2019 - JavaScript
-
Updated
Mar 30, 2020 - C
-
Updated
May 21, 2017 - Python
-
Updated
Feb 21, 2019 - Python
-
Updated
Nov 2, 2018 - Python
I feel like our IPC API can take a little getting used to, and there is very little public documentation; pretty much all anyone has to go off of are the few included scripts.
-
Updated
Apr 8, 2020 - C
Invalid method
There appears to be a broken method in hash extend that is not valid due to it missing a def ():
In addition to this, there appears to be no body for the method.
I've tried launching this from the .exe in the zip file download and by installing it via the Installer.msi both keep giving me the "not a valid Win32 application" message shown in the screenshot attached here. I'm running Windows XP on Parallels Desktop 14 on a Mac Mini with a 3GHz Intel Core i7 and 16GB of RAM so it isn't an issue of hardware compatibility or at least it shouldn't be. If anyone
-
Updated
Feb 27, 2019 - Python
Improve this page
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."
I'm not sure what's causing this issue, but it looks like
ROP.raw()
does something weird when given one-byte arguments.This happens on both Python2 and Python3.
Correct