7h3h4ckv157 / Binary-exploitation-seriesLinks
A series of writes about “Binary Exploitation”.
☆84Updated 2 years ago
Alternatives and similar repositories for Binary-exploitation-series
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- Rodan Exploitation Framework☆101Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆27Updated 4 years ago
- Random Exploits☆50Updated 2 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆109Updated 2 years ago
- Gonna share my writeups and resources here☆67Updated 8 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Upload files done during my research.☆165Updated 5 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 7 months ago
- ☆82Updated 7 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆46Updated 3 years ago
- ☆116Updated 2 years ago
- A curated list of resources for the OSED journey.☆66Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated last week
- ☆35Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- OSCP Study Guide☆40Updated 2 years ago
- Posts about different topics☆40Updated 3 weeks ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆22Updated 4 years ago
- ☆52Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- vulnlab.com reaper writeup☆26Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago