JasonPap / Buffer-Overflows
An introduction to buffer overflow vulnerabilities exploitation.
☆14Updated 2 years ago
Alternatives and similar repositories for Buffer-Overflows:
Users that are interested in Buffer-Overflows are comparing it to the libraries listed below
- demo of an attack & defense CTF☆16Updated 6 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 11 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ctf101 systems security repository☆25Updated 3 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- A VM for RE and Pwn☆25Updated 9 months ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Repository for Insomni'hack finals 2015☆22Updated 9 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 4 years ago
- OverTheWire Wargames write-ups☆22Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Malquarium - Modern Malware Repository☆47Updated 5 years ago
- ☆28Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Kernel Hacking study materials collection☆107Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- ☆21Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- ☆50Updated 7 years ago
- ☆87Updated 6 years ago