TeamUnderdawgs / BinaryExploitation-For-CTFsLinks
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆10Updated 5 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
Sorting:
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Accompanying material needed for the workshop☆11Updated 2 years ago
- Some vulnerability research slides that I made☆12Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- Insecure Deserialization, PDF and lab☆18Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- A python-based padding oracle tool☆20Updated last year
- ☆10Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last year
- ☆16Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last year
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Updated 5 years ago
- A tool for creating proxy dll for hijacking☆42Updated last year
- Noob Penetration tester☆11Updated 6 months ago
- CVE, reports, research☆15Updated 4 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Updated 5 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Updated 3 years ago