RutgersCyberKnights / BinaryExploitation
☆12Updated 8 years ago
Alternatives and similar repositories for BinaryExploitation:
Users that are interested in BinaryExploitation are comparing it to the libraries listed below
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- ☆11Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 4 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 9 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆18Updated 7 years ago
- A platform for jeopardy CTF (capture-the-flag) competitions written in Django.☆14Updated 6 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆10Updated 8 years ago
- ☆14Updated 8 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 6 years ago
- ☆13Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆32Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 8 years ago
- ☆13Updated 8 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- ☆10Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- A Pythonic wrapper to MassDNS☆24Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago