Diego-AltF4 / GLUFSLinks
GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
☆26Updated 3 years ago
Alternatives and similar repositories for GLUFS
Users that are interested in GLUFS are comparing it to the libraries listed below
Sorting:
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆76Updated last year
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- ☆50Updated 3 years ago
- ☆105Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆105Updated 3 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆48Updated 6 months ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 8 months ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- ☆148Updated last year
- ☆64Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- vulnerable windows binaries for exploitation practice☆45Updated 3 years ago
- A curated list of resources for the OSED journey.☆67Updated 3 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆86Updated last week
- Binary Exploitation Phrack CTF Challenge☆135Updated 2 months ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- ☆53Updated 6 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆158Updated last month
- ☆90Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago