7etsuo / ROP-Lab-Server
VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques
☆16Updated last year
Alternatives and similar repositories for ROP-Lab-Server:
Users that are interested in ROP-Lab-Server are comparing it to the libraries listed below
- ☆39Updated last year
- ☆37Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆80Updated this week
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆29Updated this week
- vulnlab.com reaper writeup☆26Updated last year
- Repo for all my exploits/PoCs☆50Updated this week
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 3 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆19Updated 7 months ago
- BYOVD Technique Example using viragt64 driver☆38Updated 9 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 11 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆38Updated 2 weeks ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- Collection of red team techniques.☆48Updated 2 weeks ago
- ☆141Updated 6 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆56Updated last year
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆43Updated last month
- Attacking the cleanup_module function of a kernel module☆32Updated last month
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- ☆56Updated 5 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- ☆38Updated 2 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 9 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆46Updated 4 months ago