A series of writes about “Binary Exploitation”.
☆85Jun 25, 2023Updated 2 years ago
Alternatives and similar repositories for Binary-exploitation-series
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆94Mar 2, 2024Updated 2 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆544Aug 4, 2022Updated 3 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- ☆779Oct 17, 2023Updated 2 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- ☆13Mar 20, 2021Updated 5 years ago
- NetBIOS Name Service spoofing tool☆14Feb 7, 2014Updated 12 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆27May 14, 2022Updated 3 years ago
- win32k LPE☆465Jan 27, 2022Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Oct 8, 2023Updated 2 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆268Nov 18, 2022Updated 3 years ago
- Hi everyone,☆61Jul 15, 2023Updated 2 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- ☆167Jan 7, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆44Jul 9, 2024Updated last year
- Some of my windows kernel exploits for learning purposes☆137May 18, 2022Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆830Feb 7, 2023Updated 3 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Mar 19, 2022Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Apr 18, 2022Updated 4 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- ☆80Feb 26, 2025Updated last year
- Collection of slides☆33Aug 20, 2025Updated 8 months ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago