RutgersCyberKnights / BinaryExploitationLinks
☆12Updated 9 years ago
Alternatives and similar repositories for BinaryExploitation
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
Sorting:
- ☆28Updated 8 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 11 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆12Updated 8 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 7 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19Updated 8 years ago
- ☆10Updated 9 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- ☆23Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- ☆30Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- ☆14Updated 7 years ago
- ☆13Updated 9 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆26Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 6 years ago
- ☆20Updated 6 years ago
- Pentest utils☆14Updated 9 years ago