All things Binary Exploitation, Memory, Assembly and Corruptions.
☆10Sep 25, 2020Updated 5 years ago
Alternatives and similar repositories for BinaryExploitation-For-CTFs
Users that are interested in BinaryExploitation-For-CTFs are comparing it to the libraries listed below
Sorting:
- ☆13May 27, 2020Updated 5 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- This repository is deprecated. See 02h.shawnd.xyz instead.☆16Aug 28, 2023Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆13Mar 16, 2022Updated 3 years ago
- ☆21Mar 5, 2022Updated 4 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Another Repo of Malware. Enjoy. <3☆60Feb 27, 2019Updated 7 years ago
- desktop screenshot☆29Apr 26, 2023Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- CTF writeups☆30May 27, 2022Updated 3 years ago
- An entry level resource to learning bug bounty.☆28Apr 11, 2018Updated 7 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆66Sep 23, 2017Updated 8 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆35Jan 4, 2023Updated 3 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- Malware Analysis Tools☆32Oct 26, 2019Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞☆44Jul 8, 2022Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- CVE-2022-24086 about Magento RCE☆36Dec 16, 2022Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 4 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- ☆11May 10, 2022Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- ☆13Mar 28, 2024Updated last year
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- 要是不做开源的话,我可能早就财务自由了吧?😅☆18Dec 20, 2021Updated 4 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- ☆10Oct 28, 2025Updated 4 months ago