DSU-Projects / CSC-748-Software-Exploitation-Spring-2020
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be cov…
☆28Updated 4 years ago
Alternatives and similar repositories for CSC-748-Software-Exploitation-Spring-2020:
Users that are interested in CSC-748-Software-Exploitation-Spring-2020 are comparing it to the libraries listed below
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Vulnerabilities, exploits, and PoCs☆35Updated 2 months ago
- ☆60Updated 7 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆42Updated 2 years ago
- Windows APT Warfare, published by Packt☆66Updated last year
- ☆112Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- ☆46Updated 6 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 3 years ago
- Linux process injection PoCs☆28Updated 9 months ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆52Updated 10 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆80Updated 2 years ago
- ☆47Updated 4 years ago
- Random CVEs☆30Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆49Updated last year
- Finding secrets in kernel and user memory☆114Updated last year
- ☆42Updated 2 years ago