A series of writes about “Binary Exploitation”.
☆85Jun 25, 2023Updated 2 years ago
Alternatives and similar repositories for Binary-exploitation-series
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
Sorting:
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Mar 2, 2024Updated 2 years ago
- NetBIOS Name Service spoofing tool☆14Feb 7, 2014Updated 12 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- ☆13Mar 20, 2021Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- ☆159Jan 7, 2022Updated 4 years ago
- ☆777Oct 17, 2023Updated 2 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- win32k LPE☆464Jan 27, 2022Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- ☆59Apr 8, 2021Updated 4 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆58Jan 10, 2022Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆543Aug 4, 2022Updated 3 years ago
- ☆13Mar 28, 2024Updated last year
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- ☆44Jul 9, 2024Updated last year
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆265Nov 18, 2022Updated 3 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆90Oct 8, 2023Updated 2 years ago
- ☆1,073May 18, 2024Updated last year
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- ☆523Jun 5, 2023Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago