7h3h4ckv157 / Binary-exploitation-series
A series of writes about “Binary Exploitation”.
☆85Updated last year
Alternatives and similar repositories for Binary-exploitation-series:
Users that are interested in Binary-exploitation-series are comparing it to the libraries listed below
- Gonna share my writeups and resources here☆62Updated last month
- Materials from different CTFs for later reuse☆24Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A curated list of resources for the OSED journey.☆58Updated 3 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆32Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆59Updated 4 years ago
- ☆86Updated 7 years ago
- QuoteDB (Vulnerable TCP Server)☆62Updated last year
- ☆59Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆42Updated 4 years ago
- ☆78Updated 3 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 3 years ago
- OSCP Study Guide☆40Updated 2 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- Pwning notes☆45Updated 6 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last week
- Learning resources and external resources to help you prepare for your offsec certifications☆58Updated 3 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 10 months ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆96Updated 2 years ago
- ☆36Updated last year
- Review of AWAE.OSWE☆31Updated 2 years ago
- A comprehensive Hypervisor resources repo☆103Updated last week
- ☆15Updated 5 years ago
- ☆44Updated 3 years ago
- ☆46Updated 6 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Practice Labs☆85Updated 4 years ago
- Random Exploits☆50Updated last year