RutgersCyberKnights / BinaryExploitationLinks
☆12Updated 9 years ago
Alternatives and similar repositories for BinaryExploitation
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
Sorting:
- Capture-The-Flag(CTF) toolkit☆11Updated 11 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 9 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆12Updated 8 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆29Updated 8 years ago
- ☆10Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- ☆25Updated 6 years ago
- ☆21Updated 4 years ago
- ☆21Updated 6 years ago
- Useful books, links, blogs, etc.☆14Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- ☆13Updated 9 years ago
- Docker auditing and enumeration script.☆22Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 3 months ago
- Challenges used at the Cambridge 2 Cambridge event☆22Updated 9 years ago
- ☆26Updated 5 years ago
- ☆21Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- ☆52Updated last year
- ☆20Updated 11 years ago