7h3h4ckv157 / Binary-exploitation-seriesLinks
A series of writes about “Binary Exploitation”.
☆84Updated 2 years ago
Alternatives and similar repositories for Binary-exploitation-series
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- ☆35Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- Rodan Exploitation Framework☆102Updated 3 years ago
- OSCP Study Guide☆41Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 9 months ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Upload files done during my research.☆166Updated 7 months ago
- Posts about different topics☆40Updated 2 months ago
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- Gonna share my writeups and resources here☆68Updated 10 months ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆112Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- ☆51Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆48Updated 4 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- ☆116Updated 2 years ago
- A collection of red blue team staff☆47Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Presentaciones de congresos☆54Updated last year
- Practice Labs☆101Updated 4 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- My journey and notes on learning Offensive Security from the ground up☆20Updated this week
- A subset of CTF challenges I have made over the years.☆18Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago