Guide to buffer overflows
☆60Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for how2bof
Users that are interested in how2bof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Examples of FSB exploitable binaries that can be used to practice FSB.☆36Sep 3, 2021Updated 4 years ago
- ☆21Apr 2, 2024Updated 2 years ago
- ☆30Mar 31, 2017Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 5 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆17Feb 10, 2017Updated 9 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 11 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆81Apr 27, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆72Nov 27, 2018Updated 7 years ago
- A minimalistic Operating System relying on a basic bootloader and a small kernel capable of loading a given application☆12Jul 11, 2018Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆166Jun 26, 2018Updated 7 years ago
- A bunch of my exploit development helper tools, collected in one place.☆147Sep 2, 2022Updated 3 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- SockStress DoS (Denial of Service) exploit written in Python |☆38Sep 9, 2015Updated 10 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- ☆15May 11, 2023Updated 2 years ago
- ☆10Mar 6, 2026Updated last month
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- Ivar is an adapter based HTTP client that provides the ability to build composable HTTP requests.☆17Oct 5, 2017Updated 8 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Dec 1, 2017Updated 8 years ago
- A simple pickle assembler to make handcrafting pickle bytecode easier.☆15Apr 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DursVuln - Nmap Scripting Engine (NSE)☆22Jul 16, 2025Updated 8 months ago
- A simple steganalysis script writen in Python☆26Dec 12, 2013Updated 12 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆47Mar 22, 2022Updated 4 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Solarized Dark IDA Pro Theme☆66Feb 25, 2013Updated 13 years ago
- The legendary X.400 Message Transfer Agent (MTA)☆11Jul 16, 2024Updated last year