RutgersCyberKnights / BinaryExploitation
☆12Updated 8 years ago
Related projects: ⓘ
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 8 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- A Course on Advanced Level Linux Exploitation☆10Updated 6 years ago
- ☆33Updated this week
- quals-2014☆22Updated 9 years ago
- ☆21Updated this week
- ☆13Updated this week
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- ☆13Updated 6 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 9 years ago
- Useful books, links, blogs, etc.☆14Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- Script to help enumerate and dig through Github and Github Enterprise installations.☆14Updated 5 years ago
- Journey to conquer the OSCP!☆13Updated 5 years ago
- Vulnerability teaching showcase☆12Updated 8 years ago
- Proof-of-concept malware programs. For educational purpose only.☆22Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆26Updated 4 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 5 years ago
- ☆13Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- ctf101 systems security repository☆25Updated 3 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Updated 7 years ago
- Scripts that I've written that others may find useful☆14Updated 2 years ago
- ☆0Updated 5 years ago