RE / Binary Exploitation Resources
☆73Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for pwning
Users that are interested in pwning are comparing it to the libraries listed below
Sorting:
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A small repo to host b01lers' outline of what CTF is and how to get into it.☆33Apr 21, 2021Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Sep 22, 2020Updated 5 years ago
- Collection of writeups☆15Sep 26, 2021Updated 4 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- ☆22Dec 1, 2025Updated 3 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 7 months ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- A plugin for the commercial IDA Pro disassembler that warns users if they leave their instance idling for too long.☆31Feb 17, 2026Updated 3 weeks ago
- ☆264Jul 4, 2023Updated 2 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆15Jul 5, 2020Updated 5 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Nov 12, 2021Updated 4 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- ☆18Mar 26, 2024Updated last year
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- ☆23Feb 3, 2021Updated 5 years ago