7h3h4ckv157 / Binary-exploitation-seriesLinks
A series of writes about “Binary Exploitation”.
☆84Updated 2 years ago
Alternatives and similar repositories for Binary-exploitation-series
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- ☆35Updated 2 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- Gonna share my writeups and resources here☆68Updated 8 months ago
- OSCP Study Guide☆40Updated 2 years ago
- ☆52Updated 2 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆109Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 7 months ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Upload files done during my research.☆165Updated 5 months ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- Posts about different topics☆40Updated last month
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Practice Labs☆100Updated 4 years ago
- ☆82Updated 7 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- ☆27Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆46Updated 4 years ago
- Rodan Exploitation Framework☆101Updated 3 years ago
- A curated list of resources for the OSED journey.☆66Updated 3 years ago
- ☆38Updated 3 years ago
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago