TeamUnderdawgs / BinaryExploitation-For-CTFsLinks
All things Binary Exploitation, Memory, Assembly and Corruptions.
☆11Updated 4 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
Sorting:
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Noob Penetration tester☆11Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Accompanying material needed for the workshop☆11Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ☆36Updated 4 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- ☆19Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- ☆1Updated 4 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 3 months ago
- My journey and notes on learning Offensive Security from the ground up☆18Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 3 years ago
- OSED Practice binary☆24Updated last year
- ☆16Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago