Good to know, easy to forget information about binaries and their exploitation!
☆66Sep 23, 2017Updated 8 years ago
Alternatives and similar repositories for Binary-Exploitation
Users that are interested in Binary-Exploitation are comparing it to the libraries listed below
Sorting:
- Tools of the trade☆85Sep 6, 2022Updated 3 years ago
- A game based on optical illusion made with vanilla.js☆10Jan 9, 2018Updated 8 years ago
- Stuff to read up☆252Aug 14, 2020Updated 5 years ago
- MVC framework generator☆21Jul 5, 2017Updated 8 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Mar 22, 2015Updated 10 years ago
- Presence application built during Microsoft's Code.Fun.Do 2k18☆25Oct 30, 2018Updated 7 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ☆18Aug 30, 2020Updated 5 years ago
- Hassle free .gitignore manager☆35Jul 14, 2019Updated 6 years ago
- Simple single cycle RISC processor written in Verilog☆49Mar 23, 2018Updated 7 years ago
- Progred's programming contest platform written in PHP☆12Jul 6, 2016Updated 9 years ago
- ► Internal Music Player @SDSLabs☆21Oct 1, 2018Updated 7 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- A 32-bit RISC processor implementation in verilog☆21Oct 2, 2018Updated 7 years ago
- Our submission for the Goldman Sachs Quantify 2015 challenge☆15Oct 29, 2015Updated 10 years ago
- A hobby operating system written in C and Assembly (AT&T syntax) targeted for x86 architecture.☆45Jun 21, 2017Updated 8 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆168May 10, 2018Updated 7 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- Basic Hybrid Kernal with minimal features interrupt handling, command line interface☆16Apr 21, 2016Updated 9 years ago
- ☆22May 5, 2020Updated 5 years ago
- An awesome resource listing and explaining various commonly used *nix commands☆157Feb 23, 2018Updated 8 years ago
- Easily convert any image into low-poly art in just a few clicks☆20Jan 20, 2016Updated 10 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Hide information content into busy areas of images, optimally☆63Mar 21, 2017Updated 8 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Find first derivatives of functions automagically☆10Feb 21, 2017Updated 9 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,277Oct 7, 2022Updated 3 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Our recruitment page☆13Mar 31, 2022Updated 3 years ago
- C++ implementation of ELA to detect any external changes made to an image through an image editing software☆12Nov 18, 2019Updated 6 years ago
- Fuzzing framework written in OCaml☆33Aug 23, 2016Updated 9 years ago
- An app for fetching the links to video files of youtube with different formats and resolution☆25Apr 21, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Patches adbd to allow `adb root`☆10Mar 14, 2018Updated 7 years ago
- A simple NodeJS application to search for the packages/libraries that you might need for your projects.☆11May 31, 2016Updated 9 years ago
- Solutions for CTFs☆10Dec 29, 2019Updated 6 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- A small implementation of blockchain protocol.☆13Oct 26, 2017Updated 8 years ago
- Yet Another Personal Assistant (YAPA)☆14May 29, 2018Updated 7 years ago