Mymaqn / The-danger-of-repetivive-format-string-vulnerabilities-and-abusing-exit-on-full-RELROView external linksLinks
The danger of repetivive format string vulnerabilities and abusing exit on full RELRO
☆22May 26, 2022Updated 3 years ago
Alternatives and similar repositories for The-danger-of-repetivive-format-string-vulnerabilities-and-abusing-exit-on-full-RELRO
Users that are interested in The-danger-of-repetivive-format-string-vulnerabilities-and-abusing-exit-on-full-RELRO are comparing it to the libraries listed below
Sorting:
- the rounding error tool 🚩☆14May 16, 2025Updated 9 months ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- My personnal repository☆10Sep 2, 2025Updated 5 months ago
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 3 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- Challenges I've made for public CTFs.☆22Sep 30, 2025Updated 4 months ago
- Free and open binary exploitation course for 2024 NCKUCTF☆43Oct 2, 2024Updated last year
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- IECS213 微處理機系統☆12Dec 12, 2025Updated 2 months ago
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆38Feb 8, 2025Updated last year
- ☆11Dec 23, 2018Updated 7 years ago
- Formalization of the Rupert Problem for convex polyhedra.☆17Dec 15, 2025Updated 2 months ago
- ☆16Feb 1, 2026Updated 2 weeks ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- A simple GDB server for jailbroken PS4s and PS5s☆12Dec 21, 2025Updated last month
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 6 months ago
- ☆10Apr 13, 2025Updated 10 months ago
- An OCaml implementation of the DPLL algorithm for solving SAT instances. Uses nothing beyond the OCaml List library.☆19Sep 5, 2014Updated 11 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- ☆52Oct 21, 2024Updated last year
- ☆179Jul 22, 2022Updated 3 years ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated last year
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 4 years ago
- C# Process Hollowing POC☆18Jan 5, 2023Updated 3 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 4 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆19Feb 19, 2017Updated 8 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Tool to get NT system shell .☆11Jun 29, 2021Updated 4 years ago
- ☆12Aug 3, 2025Updated 6 months ago
- Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从…☆12Jun 16, 2024Updated last year
- Official source code and writeups for niteCTF 2023!☆14Dec 21, 2023Updated 2 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago