Guide to buffer overflows
☆60Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for how2bof
Users that are interested in how2bof are comparing it to the libraries listed below
Sorting:
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Sep 3, 2021Updated 4 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 4 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 7 months ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Sep 9, 2015Updated 10 years ago
- A large group of assembly language programs & samples ..with different topics and levels..from Ascci to Stack - assembly programming.☆16Jun 24, 2020Updated 5 years ago
- A minimalistic Operating System relying on a basic bootloader and a small kernel capable of loading a given application☆12Jul 11, 2018Updated 7 years ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated last year
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 10 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 3 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are goin…☆18Apr 21, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 10 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated last year
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- A simple steganalysis script writen in Python☆26Dec 12, 2013Updated 12 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- PoC malware built by copy-paste☆25Apr 10, 2021Updated 4 years ago
- Spyware detection tool☆31Nov 20, 2014Updated 11 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆10Sep 11, 2021Updated 4 years ago