7h3h4ckv157 / Binary-exploitation-series
A series of writes about “Binary Exploitation”.
☆85Updated last year
Alternatives and similar repositories for Binary-exploitation-series:
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Gonna share my writeups and resources here☆65Updated 3 months ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- ☆60Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Get GTFOBins info about a given exploit from the command line☆39Updated 8 months ago
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- ☆96Updated 3 years ago
- OSCP Study Guide☆40Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆97Updated 2 years ago
- ☆44Updated 3 years ago
- A collection of red blue team staff☆46Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆12Updated 4 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- Just another vulnerable web application.☆36Updated 8 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- offensive notes & resources☆43Updated 2 weeks ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- esoteric☆51Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago