SofianeHamlaoui / Spike-Fuzzer
Spike Fuzzer ( Spike for Archlinux ) && Audits
☆10Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Spike-Fuzzer
- A curated list of resources for the OSED journey.☆56Updated 2 years ago
- esoteric☆51Updated 4 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- ☆45Updated 5 years ago
- QuoteDB (Vulnerable TCP Server)☆61Updated 11 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆76Updated 2 years ago
- ☆180Updated 9 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆69Updated 7 years ago
- Signatus - Vulnerable TCP C++ server to practice Win 32 exploitation.☆43Updated 3 years ago
- Windbg Readable & Dark Green Theme - Own Use☆40Updated 5 years ago
- ☆58Updated 2 years ago
- ☆81Updated 7 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆79Updated 8 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆14Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- Pre-compiled builds for CVE-2021-4034☆22Updated 2 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆39Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆139Updated 3 years ago
- Repository to index useful tools for CTF's☆26Updated 4 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆78Updated 10 months ago
- An automatic Blind ROP exploitation tool☆190Updated last year
- Practice Labs☆77Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆108Updated last month
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆63Updated 2 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆57Updated 9 months ago
- The best resources for learning exploit development☆108Updated 5 years ago
- vulnerable windows binaries for exploitation practice☆36Updated 2 years ago
- ☆42Updated 2 years ago