An introduction to buffer overflow vulnerabilities exploitation.
☆14Oct 21, 2022Updated 3 years ago
Alternatives and similar repositories for Buffer-Overflows
Users that are interested in Buffer-Overflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Github Workflows üzerinde Çalışan A101 Aktüel Telegam Bot☆14Sep 29, 2023Updated 2 years ago
- 视频直播项目☆11Dec 30, 2025Updated 4 months ago
- Simple Android voice recognition app☆12Nov 21, 2012Updated 13 years ago
- Julia package for finding the longest simple path in a graph.☆14Dec 23, 2023Updated 2 years ago
- Reverse ip lookup tool written with go . Bing , Spyse , HackerTarget , ViewDns☆12May 14, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Scan every stock listed on the Nasdaq to find those with daily inside bars for trading,☆13Dec 10, 2024Updated last year
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 6 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- Telegram base free Rat☆14Apr 26, 2025Updated last year
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆57Jul 5, 2019Updated 6 years ago
- A browser-based tool for comparing and combining before/after images. No server needed, runs entirely in your browser.☆17Jan 13, 2025Updated last year
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆36Apr 18, 2013Updated 13 years ago
- Extract .jpg files from video, with accurate frame rate manipulation☆15May 10, 2013Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Find ALL old tweets with the Wayback Machine (Including from disabled accounts)☆14Jul 12, 2023Updated 2 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Nov 23, 2015Updated 10 years ago
- ☆18Apr 25, 2021Updated 5 years ago
- Plugin for CTFd that integrates a web based shell☆13Apr 16, 2018Updated 8 years ago
- ARM (A32) Linux Return-oriented Programming with Raspberry Pi☆13Sep 28, 2022Updated 3 years ago
- Collection of Jupyter Notebooks for simple sharing.☆16Oct 25, 2024Updated last year
- 🔒Siber güvenliği ve gizliliği korumaya yönelik 300'den fazla ipucundan oluşan derlenmiş bir kontrol listesi☆17May 19, 2023Updated 2 years ago
- Semantic Player☆19Nov 21, 2025Updated 5 months ago
- ☆20Feb 15, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is a text steganography application optimized for use on Twitter, written in Clojure.☆184Sep 21, 2013Updated 12 years ago
- WhatsApp Chat with anyone without saving their number☆12Dec 6, 2023Updated 2 years ago
- ☆17Jul 31, 2024Updated last year
- ☆26May 27, 2016Updated 9 years ago
- A Proxmox VE (PVE) dedicated DDNS updater written in C++☆23Jan 28, 2024Updated 2 years ago
- Decentralized media simulator based on the reporter and witnesses concept. It aims to be an alternative to mass media, surveillance, cens…☆28Dec 4, 2024Updated last year
- Anonymize people in images and videos using yolov5-crowdhuman.☆26Jan 5, 2022Updated 4 years ago
- A simple balloon popping game for Android☆13Jul 27, 2016Updated 9 years ago
- Follower Manager For Instagram☆20Apr 20, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Passive Cash Ideas☆24Feb 12, 2026Updated 2 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 6 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- WhatsApp Chat Analyser uses your Whatsapp data and analysis it and extracts insides from your cart history.☆21Jan 15, 2023Updated 3 years ago
- ☆12Jul 11, 2023Updated 2 years ago