The tool was created to assist with fuzzing and exploiting stack-based buffer overflows
☆10Dec 29, 2020Updated 5 years ago
Alternatives and similar repositories for Overflowy
Users that are interested in Overflowy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pentester's toolbox☆12May 1, 2026Updated 2 weeks ago
- ☆11Aug 26, 2024Updated last year
- Bash wrapper for NetExec to quickly validate compromised credentials across SMB, WinRM, RDP, MSSQL, and FTP☆82May 1, 2026Updated 2 weeks ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆28Dec 8, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 4 years ago
- An open-source self-hosted purple team management web application.☆27May 4, 2026Updated 2 weeks ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- ☆15Jun 5, 2024Updated last year
- CTF toolbox☆23Apr 2, 2023Updated 3 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- ☆11Aug 12, 2022Updated 3 years ago
- Knowledge Base of Exploitation Techniques☆61May 3, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SysWhispers & HellsGate Successor, fully modular Indirect & Direct Syscall Framework - EDR/AV/AC Capability Platform☆45Apr 26, 2026Updated 3 weeks ago
- A Pwning Toolkit☆28May 3, 2026Updated 2 weeks ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆24Oct 19, 2019Updated 6 years ago
- Gotham font family files☆17Jan 19, 2021Updated 5 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- Site novo do Olimpíadas Científicas☆10Dec 24, 2021Updated 4 years ago
- Python compiler that massively increases Python's code performance without code changes.☆34Sep 2, 2022Updated 3 years ago
- Data Structures at UFC 2017.2 / ITA 2025.2☆17Nov 20, 2025Updated 6 months ago
- My first dotfiles ever. Made for wayfire☆12Nov 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PHP 7 and safe-build update of the popular C99 variant of PHP Shell with MySQL support☆29Dec 1, 2019Updated 6 years ago
- Distributed Multi-INT Fusion Center designed for decentralized situational awareness.☆81Updated this week
- ☆21Sep 6, 2023Updated 2 years ago
- eJPTv2 Essentials: Notes & Machines to crush the eJPTv2 Exam.☆59Sep 1, 2025Updated 8 months ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆28Mar 5, 2026Updated 2 months ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- A xposed module to bypass protectt.ai in Kotak Neo☆52Oct 27, 2024Updated last year
- Turns a list of URLs into hostnames.☆16Feb 9, 2026Updated 3 months ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Nov 17, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Parses info about paths on a .txt it will ask to be provided, covering digital signatures, yara rules and replaces.☆16May 28, 2025Updated 11 months ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆37Mar 22, 2026Updated last month
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 9 years ago
- Scans for indications of an XSS, Oracle SQLi and filters out words containing MySQL.☆28Mar 26, 2025Updated last year
- Assembly Tutorial for Noobs!☆16May 3, 2026Updated 2 weeks ago
- Caligrafy is a modern MVC framework that leverages the powerful technologies that fuel each of the M (Model), the V (View) and the C (Con…☆15Jun 22, 2025Updated 10 months ago
- Files and Tools associated with Practical Social Engineering (2020) (c) NoStarch Press and Joe Gray☆28May 2, 2022Updated 4 years ago