Free Course Materials for LOL-Pwn
☆20May 29, 2020Updated 5 years ago
Alternatives and similar repositories for LOL-Pwn
Users that are interested in LOL-Pwn are comparing it to the libraries listed below
Sorting:
- LOL's collections☆24Oct 4, 2020Updated 5 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆44Apr 5, 2017Updated 8 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- ☆13May 21, 2021Updated 4 years ago
- type 1 thin hypervisor written in C++☆17Dec 18, 2024Updated last year
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- A collection of small examples demonstrating various linker features☆12Dec 29, 2018Updated 7 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- Compare A/AAAA DNS record for any domain in your browser by DoH JSON API.☆12Nov 13, 2023Updated 2 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆10Aug 9, 2018Updated 7 years ago
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- a selection of the dumbest, most cursed code i can come up with☆11Aug 23, 2023Updated 2 years ago
- ☆12Apr 27, 2024Updated last year
- Rust generators implemented through async/await syntax☆12Sep 29, 2023Updated 2 years ago
- This is writeup for Burp Suite room in tryhackme.com☆15Aug 8, 2020Updated 5 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago