Guide to buffer overflows
☆60Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for how2bof
Users that are interested in how2bof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Mar 31, 2017Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 9 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 11 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- A minimalistic Operating System relying on a basic bootloader and a small kernel capable of loading a given application☆12Jul 11, 2018Updated 7 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆17Nov 11, 2016Updated 9 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆166Jun 26, 2018Updated 7 years ago
- A bunch of my exploit development helper tools, collected in one place.☆148Sep 2, 2022Updated 3 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 11 years ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated 2 years ago
- ☆10Aug 8, 2020Updated 5 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 5 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Sep 9, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- ☆15May 11, 2023Updated 2 years ago
- ☆68Mar 8, 2026Updated last month
- DursVuln - Nmap Scripting Engine (NSE)☆22Jul 16, 2025Updated 9 months ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Nov 16, 2009Updated 16 years ago
- Cyber Youth Singapore 2019 Challenges Repository☆10Dec 19, 2019Updated 6 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆47Mar 22, 2022Updated 4 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Dec 11, 2024Updated last year
- ☆12Jun 1, 2016Updated 9 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆31Nov 14, 2014Updated 11 years ago
- PoC malware built by copy-paste☆25Apr 10, 2021Updated 5 years ago