JohnHammond / misfortune-ctf-challengeLinks
A small binary exploitation challenge to demonstrate a typical return2libc attack
☆32Updated 2 years ago
Alternatives and similar repositories for misfortune-ctf-challenge
Users that are interested in misfortune-ctf-challenge are comparing it to the libraries listed below
Sorting:
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆102Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆94Updated 3 months ago
- Repo for malware development practices I post on my blog☆33Updated 10 months ago
- Stack Based buffer overflow attack☆19Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆108Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- A curated list of resources for the OSED journey.☆66Updated 3 years ago
- ☆69Updated 4 years ago
- A reverse shell for Windows and Linux written in C.☆77Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆97Updated 2 years ago
- rcat☆69Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆49Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆74Updated last year
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆69Updated 2 years ago
- ☆78Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated this week
- This is a simple process injection made in C for Linux systems☆27Updated last year
- SeManageVolumePrivilege to SYSTEM☆132Updated last year
- ☆33Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- ☆40Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- My new C2 framework☆40Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- ☆84Updated 3 years ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆82Updated 6 months ago