RutgersCyberKnights / BinaryExploitationLinks
☆12Updated 9 years ago
Alternatives and similar repositories for BinaryExploitation
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
Sorting:
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 10 years ago
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- ☆13Updated 8 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- ☆25Updated 6 years ago
- ☆36Updated 5 years ago
- ☆30Updated 6 years ago
- ☆21Updated 9 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- My own tools for easing the task of pentesting / exploit writing☆50Updated 11 years ago
- ☆10Updated 9 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Red Team Automation tool powered by go and terraform☆32Updated 4 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago