AidenPearce369 / elfxtract
☆59Updated 3 years ago
Alternatives and similar repositories for elfxtract:
Users that are interested in elfxtract are comparing it to the libraries listed below
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆86Updated last year
- Easy to configure Honeypot for Blue Team☆38Updated 7 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last month
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆30Updated 2 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆51Updated 3 weeks ago
- ATLAS - Malware Analysis Description☆20Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago
- ☆24Updated 5 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆57Updated 2 months ago
- Volatility MindMap & Cheat Sheet☆29Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆139Updated 10 months ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆54Updated 3 years ago
- ☆34Updated 2 years ago
- ☆63Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- ☆25Updated last month
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Random Exploits☆50Updated last year
- Malware Analysis Tools☆29Updated 5 years ago