Find command injection and format string bugs in binaries
☆17Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for bcheck
Users that are interested in bcheck are comparing it to the libraries listed below
Sorting:
- ☆12Jul 31, 2024Updated last year
- ☆16Jan 23, 2022Updated 4 years ago
- ☆23Jan 27, 2026Updated last month
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- 基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ☆54Dec 26, 2024Updated last year
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 3 months ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- angr's exploration technique to perform taint analysis☆65Mar 26, 2020Updated 5 years ago
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- GRFICSv3 is a FREE and open source OT security lab with realistic networking and a 3D process simulation for training and learning ICS se…☆77Feb 13, 2026Updated 2 weeks ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- 一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具☆40Mar 29, 2025Updated 11 months ago
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆127Nov 15, 2025Updated 3 months ago
- This SDK allows web-based apps/pages to interact with dictation devices☆17Feb 12, 2026Updated 2 weeks ago
- 這份筆記是關於 Angelboy 2022 年在臺灣好厲駭開的 Windows Binary Exploitation 課程,內含個人撰寫的解題腳本、課堂筆記、以及自行設計的課堂練習題和架設腳本☆87Nov 20, 2024Updated last year
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Deep Generative Models course, 2025☆11Jun 5, 2025Updated 8 months ago
- A Webapp built to provide a clear visual for the various journeys characters take in Brandon Sanderson's Cosmere books.☆11Jul 3, 2025Updated 8 months ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Algorithms & Data Structures Course. MIPT.☆12Sep 26, 2025Updated 5 months ago
- This repository contains different code examples.☆11Aug 24, 2025Updated 6 months ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- AIS3 2024 情資運用及防禦的課堂教材☆50Mar 26, 2025Updated 11 months ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆91Nov 23, 2023Updated 2 years ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 4 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Counter-Strike 1.6 Dedicated Server☆10Dec 31, 2022Updated 3 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago