ahpaleus / MBELinks
Modern Binary Exploitation write-ups.
☆4Updated 5 years ago
Alternatives and similar repositories for MBE
Users that are interested in MBE are comparing it to the libraries listed below
Sorting:
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- ☆20Updated 5 years ago
- ☆30Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- ☆36Updated 6 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- CTF Writeups☆26Updated 5 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- ☆17Updated last year
- Scripts for OSCE☆18Updated 6 years ago
- My CTF writeups☆26Updated 3 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- ☆13Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago