ExploitEducation / Nebula
☆10Updated 6 years ago
Alternatives and similar repositories for Nebula:
Users that are interested in Nebula are comparing it to the libraries listed below
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Binary Golf Library☆62Updated 3 years ago
- ☆48Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- ☆27Updated 5 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆46Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 3 years ago
- ☆36Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- ☆13Updated 4 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Protocol Reverse Engineering Resources☆20Updated last year
- In line function hooking LKM rootkit☆51Updated 4 years ago
- Source files and summarized reports for some of the chapters and examples in the book.☆18Updated 7 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 4 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Automatically exported from code.google.com/p/narly☆22Updated 3 years ago
- SSD Challenges☆47Updated 2 years ago
- ☆12Updated 3 years ago