This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be cov…
☆30May 24, 2020Updated 5 years ago
Alternatives and similar repositories for CSC-748-Software-Exploitation-Spring-2020
Users that are interested in CSC-748-Software-Exploitation-Spring-2020 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 5 months ago
- Reference material for fuzzing and creating fuzzers☆19Apr 6, 2019Updated 6 years ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 4 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- The best resources for learning exploit development☆124Oct 21, 2019Updated 6 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- ☆56Dec 20, 2018Updated 7 years ago
- Fork of Joe's Own Editor with complete history☆17Jul 27, 2013Updated 12 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Fast NTFS Directory Scan and Search☆16Nov 29, 2020Updated 5 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- C++ project used for quickly querying all files/directories located on an NTFS volume/partition. It works by reading and parsing file rec…☆23Aug 26, 2025Updated 6 months ago
- A very simple and small web server for 2.11BSD, called by inetd☆15Feb 21, 2025Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- My conference presentations and Materials for them.☆33Aug 29, 2022Updated 3 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆11May 22, 2023Updated 2 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago