Diego-AltF4 / GLUFSLinks
GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
☆27Updated 3 years ago
Alternatives and similar repositories for GLUFS
Users that are interested in GLUFS are comparing it to the libraries listed below
Sorting:
- ☆50Updated 3 years ago
- An automatic Blind ROP exploitation tool☆208Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆138Updated 3 months ago
- ☆105Updated last year
- ☆54Updated 6 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆108Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆78Updated last year
- ☆147Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- ☆44Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆161Updated this week
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆95Updated last month
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- ☆50Updated 3 years ago
- Write ups for Ph0wn CTF☆47Updated 3 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 10 months ago
- ☆64Updated last year
- Linux process injection PoCs☆30Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 8 months ago
- Memory mapping profiles for forensic analysis using volatility 3☆30Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated 2 years ago
- LD_PRELOAD rootkit☆138Updated last year
- ☆207Updated last year