raptor_infiltrate20 VS exploits

Compare raptor_infiltrate20 vs exploits and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
raptor_infiltrate20 exploits
1 3
27 574
- -
2.8 2.8
4 months ago 4 months ago
C C
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

raptor_infiltrate20

Posts with mentions or reviews of raptor_infiltrate20. We have used some of these posts to build our list of alternatives and similar projects.

exploits

Posts with mentions or reviews of exploits. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-18.
  • Nothing new under the Sun - Discovering and exploiting a CDE bug chain
    2 projects | /r/netsec | 18 Jan 2023
    I have identified multiple security vulnerabilities that are exploitable via the the setuid-root dtprintinfo binary from the Common Desktop Environment (CDE) distributed with Oracle Solaris 10. I demonstrated the possibility to chain together a printer name injection bug in dtprintinfo and a stack-based buffer overflow in libXm to achieve local privilege escalation to root on a fully-patched Solaris 10 system. The exploit is available at https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtprintlibXmas.c.
  • [ITA] - Marco Ivaldi aka raptor
    1 project | /r/SecurityIT | 13 Jul 2022
  • Multiple vulnerabilities in Zyxel zysh
    2 projects | /r/netsec | 7 Jun 2022
    The format string exploit written in Tcl/Expect (!) is here: https://github.com/0xdea/exploits/blob/master/zyxel/raptor_zysh_fhtagn.exp

What are some alternatives?

When comparing raptor_infiltrate20 and exploits you can also consider the following projects:

fswatch - A cross-platform file change monitor with multiple backends: Apple OS X File System Events, *BSD kqueue, Solaris/Illumos File Events Notification, Linux inotify, Microsoft Windows and a stat()-based backend.

vulns - HN Security's advisories.

OSCP-BoF - This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.

WendzelNNTPd - A usable and IPv6-ready Usenet-server (NNTP daemon). It is portable (Linux/*BSD/*nix), supports AUTHINFO authentication, contains ACL as well as role based ACL and provides "invisible" newsgroups. It can run on MySQL and SQLite backends.

rar2fs - FUSE file system for reading RAR archives

arp-scan - The ARP Scanner

openvas-scanner - This repository contains the scanner component for Greenbone Community Edition.

vulns - Named vulnerabilities and their practical impact

mg - Micro (GNU) Emacs-like text editor ❤️ public-domain