A gentle introduction to binary exploitation
☆41May 9, 2020Updated 5 years ago
Alternatives and similar repositories for binary-exploitation-intro
Users that are interested in binary-exploitation-intro are comparing it to the libraries listed below
Sorting:
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Example project from my "Manipulating Embedded Lua VMs" series. Read more at: https://openpunk.com/pages/manipulating-lua-vms-1/☆11Apr 21, 2019Updated 6 years ago
- Heap analysis tooling for dlmalloc☆32Jun 13, 2022Updated 3 years ago
- linux-exploit☆14Jun 12, 2019Updated 6 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- pure-python C types packer/unpacker☆19Mar 1, 2020Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 6 months ago
- crashmon - A LLDB Based replacement for CrashWrangler☆46Nov 25, 2023Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Writeups of Capture The Flag Competitions☆122Jul 13, 2022Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- Plugin of x64dbg to help you analyze object-oriented applications☆25Aug 26, 2020Updated 5 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- ☆157Jun 15, 2022Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- windows tiny reverse shell☆27Mar 21, 2022Updated 3 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Nov 24, 2018Updated 7 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Jun 3, 2019Updated 6 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 5 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- Self-hosting C toolchain, from scratch☆36Feb 7, 2025Updated last year