Codebase list dotdotpwn / d52ccc55-32c9-4445-9d15-cef7e74f0737/main TODO.txt
d52ccc55-32c9-4445-9d15-cef7e74f0737/main

Tree @d52ccc55-32c9-4445-9d15-cef7e74f0737/main (Download .tar.gz)

TODO.txt @d52ccc55-32c9-4445-9d15-cef7e74f0737/mainraw · history · blame

                          --= TO DO =--


-------------------------------------

IPS/IDS Evasion
Implementation of obfuscation/evasion/encoding/double (en|de)coding techniques 
before sending the fuzz patterns.

Proxy functionality
Implementation of proxy functionality in order to interact with 3rd-party
software such as TOR, socat, etc...

Idea By: Carlos A. Ayala Rocha
         http://twitter.com/caar2000

-------------------------------------

Path obfuscation techniques
(e.g. /etc/./passwd or /etc/proc/../passwd instead of /etc/passwd)

Idea By: Christian Yerena
         http://twitter.com/preth00nker

------------------------------------- 

Save the results of the BisectionAlgorithm in the reports. It's a recursive
subroutine and I'm a newbie working with open file descriptors between
packages and recursive subroutines.

Idea By: Alejandro Hernandez (nitr0us)
         http://twitter.com/nitr0usmx

-------------------------------------