7h3h4ckv157 / Binary-exploitation-series
A series of writes about “Binary Exploitation”.
☆85Updated last year
Alternatives and similar repositories for Binary-exploitation-series:
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- Gonna share my writeups and resources here☆63Updated 2 months ago
- A curated list of resources for the OSED journey.☆60Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- QuoteDB (Vulnerable TCP Server)☆64Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 11 months ago
- Practice Labs☆86Updated 4 years ago
- Slides and other material from various conference presentations.☆40Updated 3 weeks ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆36Updated last year
- OSCP Study Guide☆40Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆45Updated 3 years ago
- ☆96Updated 3 years ago
- ☆60Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- ☆134Updated last year
- eLearnSecurity Certified Exploit Development☆103Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆45Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- ☆52Updated last year
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 2 years ago
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆44Updated 2 years ago