Guide to buffer overflows
☆59Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for how2bof
Users that are interested in how2bof are comparing it to the libraries listed below
Sorting:
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Sep 3, 2021Updated 4 years ago
- ☆30Mar 31, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 4 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- A collection of pwn execrise☆28Oct 31, 2019Updated 6 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 10 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last week
- ☆72Nov 27, 2018Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆146Sep 2, 2022Updated 3 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Binary Golf Grand Prix☆116Oct 31, 2023Updated 2 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Sep 9, 2015Updated 10 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- ☆10Mar 6, 2026Updated 2 weeks ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- Ivar is an adapter based HTTP client that provides the ability to build composable HTTP requests.☆17Oct 5, 2017Updated 8 years ago
- ☆17Aug 24, 2019Updated 6 years ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 8 months ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 10 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- A simple steganalysis script writen in Python☆26Dec 12, 2013Updated 12 years ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Nov 16, 2009Updated 16 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 3 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago