CheckPointSW / QueryOrientedProgramming
Query Oriented Programming (QOP) gadgets for SQLite-based exploitation
☆49Updated 2 years ago
Alternatives and similar repositories for QueryOrientedProgramming:
Users that are interested in QueryOrientedProgramming are comparing it to the libraries listed below
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Python Time Based Authentication Attack Tool☆22Updated 3 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Fork Free Fail Repeat☆46Updated 3 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆67Updated 5 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- ☆96Updated 3 years ago
- Format string exploitation helper☆45Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- ☆36Updated 6 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago
- For code snippets and information☆41Updated 5 years ago
- ☆52Updated 5 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago
- ☆100Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 4 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- ☆44Updated 6 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆52Updated 4 years ago
- A library for patching ELFs☆53Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago