7h3h4ckv157 / Binary-exploitation-seriesView external linksLinks
A series of writes about “Binary Exploitation”.
☆85Jun 25, 2023Updated 2 years ago
Alternatives and similar repositories for Binary-exploitation-series
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
Sorting:
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆91Mar 2, 2024Updated last year
- NetBIOS Name Service spoofing tool☆14Feb 7, 2014Updated 12 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- ☆13Mar 20, 2021Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆96Aug 11, 2021Updated 4 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- ☆159Jan 7, 2022Updated 4 years ago
- ☆778Oct 17, 2023Updated 2 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- win32k LPE☆465Jan 27, 2022Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆158Sep 5, 2022Updated 3 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 3 months ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆56Jan 10, 2022Updated 4 years ago
- ☆59Apr 8, 2021Updated 4 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆541Aug 4, 2022Updated 3 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- ☆43Jul 9, 2024Updated last year
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 3 months ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆265Nov 18, 2022Updated 3 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- ☆1,071May 18, 2024Updated last year
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- ☆523Jun 5, 2023Updated 2 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆24Feb 1, 2026Updated 2 weeks ago