MatheuZSecurity / Simple-BufferOverflow
A simple C program to demonstrate a Buffer Overflow.
☆11Updated 3 years ago
Alternatives and similar repositories for Simple-BufferOverflow
Users that are interested in Simple-BufferOverflow are comparing it to the libraries listed below
Sorting:
- A simple script to automate systemd backdoor☆23Updated 2 years ago
- 🔨 Linux Hash Cracker☆31Updated 10 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- a cpp wrapper for ngrok☆9Updated 4 years ago
- A script to protect your king in KoTH☆15Updated 3 years ago
- ☆19Updated 4 months ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 5 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆57Updated 5 months ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆10Updated 4 months ago
- ⭐ Physics class project☆34Updated 2 years ago
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆8Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆34Updated 5 months ago
- Tool to start a python http server in a simple way☆10Updated 3 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 9 months ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- 🍞 BREADS is a tool focused on enumerating and attacking Active Directory environments through LDAP, SMB, and other protocols. This proje…☆33Updated 5 months ago
- ☆38Updated 2 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆23Updated last month
- DNS over HTTPS targeted malware (only runs once)☆97Updated last year
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- ☆67Updated 3 years ago
- A simple tool that can save your life in an invasion. It consists of the junction of several modules (Commands/Loads) essential in an inv…☆12Updated 3 years ago
- A toolkit to control TTY devices☆1Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆51Updated 2 months ago
- Exploit development challenges!☆24Updated 2 years ago
- a simple assembly bootloader using nasm and Intel syntax☆10Updated 3 years ago
- ☆12Updated 4 years ago