ExploitEducation / Nebula
☆10Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Nebula
- ☆36Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- HN Security's advisories.☆21Updated 3 weeks ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆25Updated 4 years ago
- ☆26Updated 5 years ago
- ☆28Updated 3 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆28Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Protocol Reverse Engineering Resources☆20Updated last year
- Content related to hardware hacking☆46Updated 5 years ago
- ☆13Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 5 years ago
- ☆16Updated 4 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 4 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- ☆30Updated 6 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- ☆36Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- Binary Golf Library☆62Updated 3 years ago