Diego-AltF4 / GLUFSLinks
GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
☆26Updated 3 years ago
Alternatives and similar repositories for GLUFS
Users that are interested in GLUFS are comparing it to the libraries listed below
Sorting:
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆74Updated last year
- ☆51Updated 6 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- ☆105Updated last year
- ☆49Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 6 months ago
- Binary Exploitation Phrack CTF Challenge☆85Updated last week
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- Write ups for Ph0wn CTF☆44Updated 2 weeks ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆102Updated 3 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆152Updated 2 weeks ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A curated list of resources for the OSED journey.☆66Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- ☆64Updated last year
- ☆147Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆49Updated last year
- ☆205Updated 10 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆45Updated 4 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 10 months ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆14Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- ☆45Updated 4 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- vulnerable windows binaries for exploitation practice☆42Updated 3 years ago