This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be cov…
☆30May 24, 2020Updated 5 years ago
Alternatives and similar repositories for CSC-748-Software-Exploitation-Spring-2020
Users that are interested in CSC-748-Software-Exploitation-Spring-2020 are comparing it to the libraries listed below
Sorting:
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- The best resources for learning exploit development☆124Oct 21, 2019Updated 6 years ago
- Offensive OSINT☆33Sep 5, 2020Updated 5 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- My conference presentations and Materials for them.☆33Aug 29, 2022Updated 3 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆32Jul 1, 2021Updated 4 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Example ASP.NET MVC website that handles 404 using <httpErrors> in web.config☆10Oct 14, 2015Updated 10 years ago
- ☆57Dec 20, 2018Updated 7 years ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆48Aug 12, 2022Updated 3 years ago
- A simple GDB server for jailbroken PS4s and PS5s☆12Dec 21, 2025Updated 2 months ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- Angular Personal Resume And Portfolio Template☆11Updated this week
- Get GTFOBins info about a given exploit from the command line☆39Aug 4, 2024Updated last year
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆12Oct 10, 2024Updated last year
- CISSP Books Free Download☆20Jul 27, 2024Updated last year
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆13Apr 11, 2024Updated last year
- Windows 10/11 unsigned kernel driver load/debugging☆17Feb 17, 2023Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- WEB渗透测试数据库☆10Sep 20, 2016Updated 9 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago