THE

SPRAWL

  •  
  •  
  •  
  • sprawllatest

    getting from seh to nseh

    A collection of techniques on Windows SEH exploitation. Specifically the article covers methods of reliable exploit development by getting from a successfully overwritten pointer to Exception Handler (SEH) to the pointer to the Next Exception Handler (NSEH) struct. Read more.

    corelan - tutorial 3b - exercise solution

    A solution to the MP3 Studio exercise at the end of the Exploit Writing Tutorial Part 3b by Corelan Team. The solution illustrates a sample buffer overflow exploitation of a Windows application. Read more.

    tiger team - 24 karat caper

    In the second episode of CourtTV's original television series Tiger Team a team of security professionals break into a jeweler office serving Hollywood's elite. Read more.

    tiger team - the car dealership takedown

    In the pilot episode of CourtTV's original television series Tiger Team a team of security professionals steal a car from a dealership. Read more.

    the dutch hacker video

    A video recording produced by the 2600 Magazine showing an attack on a US Army computer during the summer of 1991. Read more.

    11 sep
    2011
    sprawl 5.0

    The Sprawl project has undergone another major overhaul. The new site is designed to enhance usability and security by using the Django framework as a foundation. Read more.

    airoscapy

    Download airoscapy.py
    Size 2.1 KB
    DateAugust 28th, 2011
    Version0.2

    Airoscapy is a passive wireless access point scanner. Using this tool you can monitor Access Point's SSID, BSSID, Channel and Encryption support. Read more.

    tor nodes

    Download tor-nodes.py
    Size 372 bytes
    DateAugust 27th, 2011
    Version0.2

    Enumerates IP addresses of Tor nodes by querying Tor client. Read more.



    π
    ///\oo/\\\