Codebase list dotdotpwn / ce1e5d2a-1e2c-4f80-9afb-0971123f5bee/upstream TODO.txt
ce1e5d2a-1e2c-4f80-9afb-0971123f5bee/upstream

Tree @ce1e5d2a-1e2c-4f80-9afb-0971123f5bee/upstream (Download .tar.gz)

TODO.txt @ce1e5d2a-1e2c-4f80-9afb-0971123f5bee/upstreamraw · history · blame

                          --= TO DO =--


-------------------------------------

IPS/IDS Evasion
Implementation of obfuscation/evasion/encoding/double (en|de)coding techniques 
before sending the fuzz patterns.

Proxy functionality
Implementation of proxy functionality in order to interact with 3rd-party
software such as TOR, socat, etc...

Idea By: Carlos A. Ayala Rocha
         http://twitter.com/caar2000

-------------------------------------

Path obfuscation techniques
(e.g. /etc/./passwd or /etc/proc/../passwd instead of /etc/passwd)

Idea By: Christian Yerena
         http://twitter.com/preth00nker

------------------------------------- 

Save the results of the BisectionAlgorithm in the reports. It's a recursive
subroutine and I'm a newbie working with open file descriptors between
packages and recursive subroutines.

Idea By: Alejandro Hernandez (nitr0us)
         http://twitter.com/nitr0usmx

-------------------------------------