adamaviv / si485h-f18
SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version
☆22Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for si485h-f18
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- esoteric☆50Updated 4 years ago
- OSEE Preparation☆171Updated 5 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆139Updated 3 years ago
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- ☆25Updated 4 months ago
- ☆24Updated 8 years ago
- Web Exploitation Workflow for CTF Challenges☆49Updated 7 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆98Updated 4 years ago
- Git repo for challenges of encryptCTF 2019☆21Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆38Updated 4 years ago
- ☆20Updated 2 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆18Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆91Updated 3 years ago
- ☆27Updated 4 years ago
- ☆181Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆219Updated 4 years ago
- Pwning notes☆45Updated 3 months ago
- Reverse engineering challenges☆50Updated 5 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 4 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 3 years ago
- ☆81Updated 7 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- Exploitation and Mitigation Slides☆127Updated 5 months ago
- Set of pre-generated pwn.college challenges☆61Updated last year