Stash for Binary Exploitation and Reverse Engineering Resources
☆105Sep 22, 2020Updated 5 years ago
Alternatives and similar repositories for Scuffed_Low_Level_Stash
Users that are interested in Scuffed_Low_Level_Stash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RE / Binary Exploitation Resources☆73Dec 1, 2017Updated 8 years ago
- Taking another crack at OS dev...☆11Jun 12, 2022Updated 3 years ago
- ☆37Feb 28, 2021Updated 5 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 11 months ago
- This is a MD5 password/passphrase brute force tool☆10Mar 13, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Source for BuckeyeCTF 2022 challenges☆27Nov 7, 2022Updated 3 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆362Jan 4, 2024Updated 2 years ago
- ☆23Jul 3, 2020Updated 5 years ago
- GitLab 12.9.0 Arbitrary File Read☆70Apr 23, 2021Updated 5 years ago
- ☆14Feb 12, 2026Updated 2 months ago
- Fast and clear TryHackMe desktop application for Windows /Linux / MacOS☆12Feb 6, 2021Updated 5 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 12 years ago
- In Soviet Russia, Mithril forges ELF.☆28Jan 23, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆21Jan 11, 2022Updated 4 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 9 years ago
- Linux Binary Exploitation☆1,358Jun 15, 2021Updated 4 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- ☆2,979Feb 8, 2026Updated 2 months ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- my writeups (mainly pwnable)☆34Sep 22, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- vulnerable windows binaries for exploitation practice☆46Jun 6, 2022Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 3 months ago
- ☆18Apr 4, 2019Updated 7 years ago
- ☆181Jan 18, 2020Updated 6 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Jul 9, 2025Updated 9 months ago
- Binary Ninja plugin to provide MCP functionality.☆32Apr 27, 2026Updated last week
- Good to know, easy to forget information about binaries and their exploitation!☆66Sep 23, 2017Updated 8 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Apache Tomcat Manager API WAR Shell Upload☆36Jul 9, 2020Updated 5 years ago
- Heimdall theme inspired from Microtech Hydra UI shown in Cyberpunk 2077☆17Aug 10, 2025Updated 8 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆10Nov 21, 2022Updated 3 years ago
- ☆12Jan 10, 2024Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 6 years ago