DSU-Projects / CSC-748-Software-Exploitation-Spring-2020Links
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be cov…
☆28Updated 5 years ago
Alternatives and similar repositories for CSC-748-Software-Exploitation-Spring-2020
Users that are interested in CSC-748-Software-Exploitation-Spring-2020 are comparing it to the libraries listed below
Sorting:
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆78Updated 7 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- ☆63Updated last year
- ☆91Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 3 years ago
- ☆50Updated 6 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Vulnerabilities, exploits, and PoCs☆36Updated last month
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆45Updated 3 years ago
- Windows APT Warfare, published by Packt☆70Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆225Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 9 months ago
- ☆138Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆22Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- ☆135Updated 4 months ago
- ☆12Updated 4 years ago