B1rby / Stack-Based-Buffer-Overflows
Stack Based buffer overflow attack
☆19Updated last year
Alternatives and similar repositories for Stack-Based-Buffer-Overflows:
Users that are interested in Stack-Based-Buffer-Overflows are comparing it to the libraries listed below
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- ☆11Updated last year
- Presentaciones de congresos☆52Updated 9 months ago
- ☆12Updated 4 years ago
- vulnerable windows binaries for exploitation practice☆39Updated 2 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆17Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A small red team course☆36Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- ☆28Updated 3 years ago
- ☆15Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆17Updated last year
- IAT Unhooking proof-of-concept☆30Updated 11 months ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆48Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- vulnlab.com reaper writeup☆26Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆20Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago