SofianeHamlaoui / Spike-Fuzzer
Spike Fuzzer ( Spike for Archlinux ) && Audits
☆11Updated 5 years ago
Alternatives and similar repositories for Spike-Fuzzer:
Users that are interested in Spike-Fuzzer are comparing it to the libraries listed below
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- esoteric☆52Updated 4 years ago
- An automatic Blind ROP exploitation tool☆202Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- Loads a custom dll in system32 via diaghub.☆72Updated 5 years ago
- xortigate-cve-2023-27997☆62Updated last year
- Windbg Readable & Dark Green Theme - Own Use☆44Updated 6 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆84Updated last year
- CVE-2023-33733 reportlab RCE☆115Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆56Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆39Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆108Updated 10 months ago
- ☆50Updated 6 years ago
- Signatus - Vulnerable TCP C++ server to practice Win 32 exploitation.☆47Updated 3 years ago
- ☆114Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆116Updated last week
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆58Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆12Updated 3 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated 11 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆49Updated last week
- Windows x64 Exploitation Training☆14Updated last week
- ASLR bypass without infoleak☆160Updated 3 years ago