TeamUnderdawgs / BinaryExploitation-For-CTFs
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 4 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs:
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Stack Based buffer overflow attack☆19Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- Noob Penetration tester☆11Updated 10 months ago
- Reverse Shell troll software☆12Updated 5 years ago
- My nim learning experiments☆11Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- OSED Practice binary☆24Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆14Updated 2 years ago
- ☆30Updated 11 months ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- Writeup of CVE-2020-15906☆47Updated 4 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- Exploits written while preparing for the OSED exam☆20Updated 11 months ago