3ndG4me / binary_exploitationLinks
Notes and goodies to make binary exploitation life easier
☆10Updated 6 years ago
Alternatives and similar repositories for binary_exploitation
Users that are interested in binary_exploitation are comparing it to the libraries listed below
Sorting:
- module for certexfil☆15Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- ☆14Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- ☆17Updated 4 years ago
- golang String Obfuscate☆9Updated 3 years ago
- ☆12Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- ☆7Updated 5 years ago
- Zerokit shared code☆16Updated 6 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ☆10Updated 3 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- ☆15Updated last year
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 6 months ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- ☆14Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Updated 4 years ago