B1rby / Stack-Based-Buffer-OverflowsLinks
Stack Based buffer overflow attack
☆20Updated last year
Alternatives and similar repositories for Stack-Based-Buffer-Overflows
Users that are interested in Stack-Based-Buffer-Overflows are comparing it to the libraries listed below
Sorting:
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆46Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- ☆31Updated 3 years ago
- vulnerable windows binaries for exploitation practice☆40Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Presentaciones de congresos☆53Updated 11 months ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 5 months ago
- ☆11Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 4 months ago
- A small red team course☆39Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆70Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- vulnlab.com reaper writeup☆26Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- ☆40Updated this week
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- rcat☆67Updated 3 years ago
- Exploit Development CheatSheet.☆16Updated 3 years ago
- in-process powershell runner for BRC4☆45Updated last year
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago