Good to know, easy to forget information about binaries and their exploitation!
☆66Sep 23, 2017Updated 8 years ago
Alternatives and similar repositories for Binary-Exploitation
Users that are interested in Binary-Exploitation are comparing it to the libraries listed below
Sorting:
- Tools of the trade☆85Sep 6, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Mar 22, 2015Updated 10 years ago
- Stuff to read up☆252Aug 14, 2020Updated 5 years ago
- Presence application built during Microsoft's Code.Fun.Do 2k18☆25Oct 30, 2018Updated 7 years ago
- Hassle free .gitignore manager☆35Jul 14, 2019Updated 6 years ago
- Writeups for different CTF challenges☆70Mar 25, 2025Updated 11 months ago
- ☆18Aug 30, 2020Updated 5 years ago
- Simple single cycle RISC processor written in Verilog☆49Mar 23, 2018Updated 7 years ago
- Progred's programming contest platform written in PHP☆12Jul 6, 2016Updated 9 years ago
- Tool for removing duplicate bookmarks and merge directories in firefox json bookmarks backup☆16Jul 18, 2023Updated 2 years ago
- A hobby operating system written in C and Assembly (AT&T syntax) targeted for x86 architecture.☆45Jun 21, 2017Updated 8 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167May 10, 2018Updated 7 years ago
- Hide information content into busy areas of images, optimally☆63Mar 21, 2017Updated 8 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- ☆25Jan 6, 2016Updated 10 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,285Oct 7, 2022Updated 3 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- Patches adbd to allow `adb root`☆10Mar 14, 2018Updated 8 years ago
- FBTools allows you to access Facebook via command-line.It provides some features that are not available via Facebook Graph API.☆46Jul 8, 2017Updated 8 years ago
- Basic Hybrid Kernal with minimal features interrupt handling, command line interface☆16Apr 21, 2016Updated 9 years ago
- C++ implementation of ELA to detect any external changes made to an image through an image editing software☆12Nov 18, 2019Updated 6 years ago
- Easily convert any image into low-poly art in just a few clicks☆20Jan 20, 2016Updated 10 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- An app for fetching the links to video files of youtube with different formats and resolution☆25Apr 21, 2016Updated 9 years ago
- Yet Another Personal Assistant (YAPA)☆14May 29, 2018Updated 7 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- Python bindings for go template☆20Apr 17, 2019Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Uses proximity sensor to perform actions when ringing, Can also schedule calls.☆20Oct 1, 2020Updated 5 years ago
- Bring back Interactive Typeahead to Nautilus on Debian☆16Oct 15, 2019Updated 6 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆139Aug 23, 2024Updated last year
- Security tool to detect dns poisoning attacks☆49Dec 17, 2014Updated 11 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Dec 8, 2022Updated 3 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 7 years ago
- ☆38Mar 28, 2025Updated 11 months ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago