DSU-Projects / CSC-748-Software-Exploitation-Spring-2020Links
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be cov…
☆28Updated 5 years ago
Alternatives and similar repositories for CSC-748-Software-Exploitation-Spring-2020
Users that are interested in CSC-748-Software-Exploitation-Spring-2020 are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆72Updated 3 years ago
- ☆90Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆64Updated last year
- Vulnerabilities, exploits, and PoCs☆37Updated 4 months ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- ☆139Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- ☆137Updated 7 months ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated 11 months ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆190Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 4 months ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆112Updated 4 years ago