RutgersCyberKnights / BinaryExploitation
☆12Updated 8 years ago
Alternatives and similar repositories for BinaryExploitation:
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 8 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆12Updated 7 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- ctf101 systems security repository☆25Updated 3 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- ☆28Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ☆34Updated 4 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆39Updated 8 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 6 months ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 8 years ago
- ☆21Updated 5 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- ☆14Updated 8 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago