JohnHammond / misfortune-ctf-challenge
A small binary exploitation challenge to demonstrate a typical return2libc attack
☆31Updated last year
Alternatives and similar repositories for misfortune-ctf-challenge:
Users that are interested in misfortune-ctf-challenge are comparing it to the libraries listed below
- BSides Prishtina 2024 Malware Development and Persistence workshop☆65Updated 3 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆80Updated 2 years ago
- ☆39Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆17Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆89Updated 2 weeks ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆46Updated 9 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 4 months ago
- A project for building Linux && IoT Malware for fun and no-profit☆15Updated 3 weeks ago
- Bad scripts I made doing CTF's☆21Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆67Updated 5 months ago
- ☆58Updated 10 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- SeManageVolumePrivilege to SYSTEM☆87Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆84Updated 3 weeks ago
- ☆64Updated 3 years ago
- ☆33Updated 2 years ago
- ☆58Updated 4 months ago
- vulnlab.com reaper writeup☆26Updated last year
- ☆12Updated 4 years ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- ☆57Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Stack Based buffer overflow attack☆19Updated last year
- A curated list of resources for the OSED journey.☆58Updated 3 years ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- ☆26Updated last year
- ☆84Updated 2 years ago
- Breaking Active Directory Security with 🍞☆31Updated 3 months ago