JasonPap / Buffer-OverflowsLinks
An introduction to buffer overflow vulnerabilities exploitation.
☆14Updated 2 years ago
Alternatives and similar repositories for Buffer-Overflows
Users that are interested in Buffer-Overflows are comparing it to the libraries listed below
Sorting:
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- ctf101 systems security repository☆25Updated 3 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Writeup oriented CTF☆22Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- demo of an attack & defense CTF☆16Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆51Updated 8 years ago
- ☆21Updated 8 years ago
- The collection of all Python program from various CTF's☆26Updated 9 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 5 years ago
- Malware.lu tools☆63Updated 11 years ago
- Malquarium - Modern Malware Repository☆47Updated this week
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 9 years ago
- A VM for RE and Pwn☆25Updated last year
- ☆36Updated 6 years ago
- Offsec PWB Lab Tools☆13Updated 11 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Updated 10 years ago
- public exploits☆35Updated 2 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago