Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"
☆22Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for binary-exploitation-101
Users that are interested in binary-exploitation-101 are comparing it to the libraries listed below
Sorting:
- A custom implementation of OpenAI's GPT-2(124M) from scratch, following the paper "Language Models are Unsupervised Multitask Learners".W…☆11Apr 10, 2025Updated 10 months ago
- This is a challenge made for NexTrace CTF, Malware Analysis case☆12Oct 21, 2024Updated last year
- NetWise is a bandwidth management and optimization system developed for the DevFest Algiers Hackathon.☆13Oct 20, 2024Updated last year
- ☆14Sep 18, 2024Updated last year
- A Windows string hashing toolkit for security research and malware analysis.Research implementation of malware-focused algorithms from V…☆15Dec 29, 2024Updated last year
- ☆15Sep 21, 2024Updated last year
- This is a repo that contains 2 techniques : Local mapping injection and Remote injection technique , MITRE ID T1055☆17Oct 12, 2024Updated last year
- A repository showcasing payload execution control using mutexes, semaphores, and events in Windows, for educational purposes.☆17Dec 18, 2024Updated last year
- A powerful chatbot assistant leveraging Retrieval-Augmented Generation (RAG) to answer questions from multiple PDF documents. RAGbot gene…☆16Dec 11, 2024Updated last year
- NTAPI Anti-Debugging Checker and Patcher is a Windows-based tool designed for research purposes, demonstrating how to detect and manipula…☆17Aug 25, 2024Updated last year
- A powerful PE file inspector for analyzing Portable Executable binaries, providing detailed insights into their structure, headers, and p…☆19Dec 30, 2024Updated last year
- A custom implementation of GetModuleHandle, often used in malware to evade detection by bypassing standard API resolution methods☆18Dec 31, 2024Updated last year
- Research in progress: A malware that abuses the GPU to accelerate the decryption process.☆21Feb 26, 2025Updated last year
- nexos source files made by @samdem-ai☆20Oct 7, 2024Updated last year
- Writeups for CTF challenges☆21Dec 12, 2023Updated 2 years ago
- Native API injector☆27Aug 23, 2024Updated last year
- Code injection via Asynchronous Procedure Calls to bypass Windows defenses. Mapped to MITRE ATT&CK T1055.004.(Process Injection: Asynchro…☆33Oct 11, 2024Updated last year
- Powerful Wireless Network Auditing Framework - 2023☆10Sep 10, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- ☆11Feb 19, 2023Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- system-expert-detect-malwares☆11Oct 22, 2024Updated last year
- ☆10Feb 5, 2023Updated 3 years ago
- ☆15Feb 25, 2026Updated last week
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- ☆11Jul 6, 2022Updated 3 years ago
- This is an application for both MalwareScanner and MalwareStaging☆17Sep 13, 2024Updated last year
- Divalent siRNA for prion disease☆18Feb 20, 2026Updated last week
- ☆13Dec 1, 2024Updated last year
- The Web Application Hacker's Handbook 2 (Web应用黑客手册第二版翻译)☆20May 25, 2025Updated 9 months ago
- This project documents my hands-on journey in learning and conducting internal Active Directory (AD) penetration testing. The exercises s…☆16Apr 19, 2025Updated 10 months ago
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Feb 28, 2023Updated 3 years ago
- nexos source files made by @samdem-ai☆14Oct 7, 2024Updated last year
- My ctf challenges, mostly cryptography☆15Jul 13, 2025Updated 7 months ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- WebSocket Penetration Testing Toolkit for Burp Suite☆27Feb 12, 2026Updated 2 weeks ago
- ☆14May 28, 2022Updated 3 years ago
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆12Jun 16, 2022Updated 3 years ago