TeamUnderdawgs / BinaryExploitation-For-CTFsLinks
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 5 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
Sorting:
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago
- SLAE x86 from Pentester Academy☆15Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 9 months ago
- A tool for creating proxy dll for hijacking☆42Updated last year
- ☆17Updated 2 years ago
- ☆28Updated 6 years ago
- Noob Penetration tester☆11Updated 3 months ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- my n00b notes on web_study☆16Updated 5 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago