anyaschukin / OverRideLinks
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆71Updated 4 years ago
Alternatives and similar repositories for OverRide
Users that are interested in OverRide are comparing it to the libraries listed below
Sorting:
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- ☆80Updated 11 months ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- A memory scanner made in python for linux☆22Updated 4 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 7 months ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- ☆73Updated 2 years ago
- MacOSX Privilege Escalation Research☆30Updated 4 years ago
- Presentations from the CX Security Labs team☆35Updated 6 months ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Collected && Written N day Vulns for study purpose only☆109Updated last month
- ☆18Updated 5 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Slides and other material from various conference presentations.☆46Updated 4 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆78Updated 5 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Updated 5 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆78Updated 9 months ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago