TeamUnderdawgs / BinaryExploitation-For-CTFs
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 4 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs:
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- Updated 4 years ago
- ☆10Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Noob Penetration tester☆11Updated 11 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 2 months ago
- ☆16Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆18Updated 4 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Python script to launch burp scans automatically☆32Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Writeup of CVE-2020-15906☆47Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- A python-based padding oracle tool☆20Updated 8 months ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- ☆35Updated 3 months ago