RutgersCyberKnights / BinaryExploitationLinks
☆12Updated 9 years ago
Alternatives and similar repositories for BinaryExploitation
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
Sorting:
- Scripts for OSCE☆18Updated 6 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- ☆36Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆13Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- ☆36Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- ☆26Updated 5 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- pwnig all the (web)things☆20Updated 4 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A Web Server to hide stuff☆21Updated 3 years ago
- ☆13Updated 9 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆21Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Red Team Automation tool powered by go and terraform☆32Updated 4 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago