TeamUnderdawgs / BinaryExploitation-For-CTFsLinks
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 5 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
Sorting:
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- Insecure Deserialization, PDF and lab☆18Updated 6 years ago
- 2022 CTF public release☆23Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Noob Penetration tester☆11Updated 4 months ago
- Accompanying material needed for the workshop☆11Updated 2 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- ☆21Updated 3 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- HTTP requests of FrontPage expolit☆26Updated 11 years ago
- A tool for creating proxy dll for hijacking☆42Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 11 months ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago
- CVE, reports, research☆15Updated 4 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 10 months ago
- ☆27Updated 4 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆43Updated 4 years ago
- ☆32Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago