My Binary Exploitation's Course Practice challenge.
☆18Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for My-Course-Binary-exploitation-challenge
Users that are interested in My-Course-Binary-exploitation-challenge are comparing it to the libraries listed below
Sorting:
- AIS3 2025 課程教材 - 典範轉移:AI 時代的情資運用及防禦☆47Jul 29, 2025Updated 7 months ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- Real-time command injection monitor with syntax highlighting and balance analysis.☆23Sep 24, 2025Updated 5 months ago
- ☆29Apr 14, 2025Updated 10 months ago
- This is a scanning tools for AIS3 project in group 7☆18Aug 3, 2025Updated 7 months ago
- 一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具☆42Mar 29, 2025Updated 11 months ago
- A Windows AD Password Manager for ATTACKER(Redteamer/Pentester).☆91Sep 6, 2025Updated 6 months ago
- ☆12May 16, 2025Updated 9 months ago
- Parallel Programming Fall 2022 @ NYCU☆11Jan 12, 2023Updated 3 years ago
- Cypherpunks Hall of Fame☆23Nov 10, 2025Updated 3 months ago
- A lightweight http server for linux☆17Jun 1, 2025Updated 9 months ago
- 作業系統實作☆13Apr 26, 2018Updated 7 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- ☆31Oct 22, 2025Updated 4 months ago
- Trophy list of zero-day vulnerabilities that I discovered☆11May 6, 2024Updated last year
- 记录一下Windows下的Hook技巧☆15Jul 15, 2024Updated last year
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- A cli-based, multi-architecture gadget-finding tool, designed for fast operation, even with large binaries like browser engines and OS ke…☆17May 1, 2024Updated last year
- This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.☆13Jul 1, 2019Updated 6 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Example of CVE-2022-46689 aka MacDirtyCow.☆13Mar 1, 2023Updated 3 years ago
- ☆16Jul 18, 2024Updated last year
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆44Updated this week
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- raid is a GDB-like tiny debugger which is based on ptrace.☆16Jul 27, 2022Updated 3 years ago
- An object-oriented operating system focused on isolating processes to improve security, portability & scaling☆15Aug 9, 2023Updated 2 years ago
- Archive for acez.re blog.☆21Apr 17, 2023Updated 2 years ago
- ☆11Aug 3, 2022Updated 3 years ago
- ctf kernel pwn☆16Mar 21, 2024Updated last year
- The C source code was RESTORED by disassembling the original executable file OPTIM.COM from the Hi-Tech v3.09 compiler.☆15Aug 25, 2022Updated 3 years ago
- Contains a vagrant configuration that can be used to practise for EX294 exam☆13Oct 23, 2022Updated 3 years ago
- Fully Randomized Pointers☆19Jun 10, 2025Updated 8 months ago
- ☆15Apr 17, 2025Updated 10 months ago
- ☆17Nov 22, 2022Updated 3 years ago
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆128Jan 31, 2026Updated last month
- Best Discord Token Recovery Tool With Injection + More Sites☆16Jul 31, 2023Updated 2 years ago