TeamUnderdawgs / BinaryExploitation-For-CTFsLinks
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 4 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
Sorting:
- Reverse Shell troll software☆12Updated 5 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- A python-based padding oracle tool☆20Updated 11 months ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago
- ☆16Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 6 months ago
- ☆26Updated 6 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Noob Penetration tester☆11Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Accompanying material needed for the workshop☆11Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆18Updated 6 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Random Exploits☆50Updated last year
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago