JasonPap / Buffer-Overflows
An introduction to buffer overflow vulnerabilities exploitation.
☆14Updated 2 years ago
Alternatives and similar repositories for Buffer-Overflows:
Users that are interested in Buffer-Overflows are comparing it to the libraries listed below
- demo of an attack & defense CTF☆16Updated 6 years ago
- hax 'n shit☆119Updated 9 years ago
- ctf101 systems security repository☆25Updated 3 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 11 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆83Updated 4 years ago
- Bluetooth reverse shell.☆16Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 5 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆110Updated 5 years ago
- ☆28Updated 8 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 9 years ago
- Writeup oriented CTF☆22Updated 7 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago
- ☆10Updated 3 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- Malware.lu tools☆63Updated 11 years ago
- Kernel Hacking study materials collection☆110Updated 8 years ago
- Checkpot Honeypot Checker☆43Updated 6 years ago