RutgersCyberKnights / BinaryExploitationLinks
☆12Updated 9 years ago
Alternatives and similar repositories for BinaryExploitation
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
Sorting:
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- ☆13Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- ☆10Updated 9 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- cloud-based interactive security exercises☆14Updated 5 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆18Updated 8 years ago
- ☆53Updated 11 months ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ☆20Updated 5 years ago
- ☆21Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- ☆13Updated 9 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22Updated 9 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- ☆13Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago