TeamUnderdawgs / BinaryExploitation-For-CTFs
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 4 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs:
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last week
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- Writeup of CVE-2020-15906☆46Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Some good things for EXP-301 course☆11Updated last year
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Noob Penetration tester☆11Updated 9 months ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Presentaciones de congresos☆52Updated 8 months ago
- Reverse Shell troll software☆12Updated 5 years ago
- ☆23Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆11Updated 4 years ago
- ☆25Updated 2 years ago
- ☆30Updated 2 years ago
- OSED Practice binary☆24Updated last year
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago