alanvivona / pwnshop
Exploit Development, Reverse Engineering & Cryptography
☆246Updated 4 years ago
Related projects: ⓘ
- ☆293Updated 2 years ago
- Collection of resources for my preparation to take the OSEE certification.☆214Updated 4 years ago
- ☆173Updated 6 years ago
- Vulnerability examples.☆398Updated 4 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆135Updated 3 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- Reversing list☆145Updated 8 months ago
- Automatic exploit generation for simple linux pwn challenges.☆314Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆409Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆96Updated 3 years ago
- Code for my 0x00sec.org posts☆312Updated 4 years ago
- OSEE Preparation☆166Updated 5 years ago
- A Binary Ninja plugin for vulnerability research.☆278Updated last week
- A handy collection of my public exploits, all in one place.☆591Updated 8 months ago
- collect for learning cases☆563Updated 3 months ago
- Elf binary infector written in Go.☆202Updated 11 months ago
- A bunch of my exploit development helper tools, collected in one place.☆138Updated 2 years ago
- A happy heap editor to support your exploitation process☆196Updated 3 years ago
- a summary of linux rootkits published on GitHub☆165Updated 4 years ago
- Injects additional machine instructions into various binary formats.☆267Updated 7 months ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆139Updated 4 years ago
- 0xpat blog☆94Updated 2 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆349Updated last year
- An updated collection of resources targeting browser-exploitation.☆807Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆195Updated 2 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 2 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆221Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆213Updated last year
- ☆80Updated 6 years ago