anyaschukin / OverRideLinks
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆71Updated 4 years ago
Alternatives and similar repositories for OverRide
Users that are interested in OverRide are comparing it to the libraries listed below
Sorting:
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- ☆72Updated 2 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- ☆18Updated 5 years ago
- Presentations from the CX Security Labs team☆35Updated 3 months ago
- ☆25Updated last month
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 5 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Collected && Written N day Vulns for study purpose only☆105Updated 4 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 4 months ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆123Updated 5 years ago
- SLAE x86 from Pentester Academy☆15Updated 5 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- ☆79Updated 8 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- android-inject-hook☆15Updated 7 years ago
- ☆11Updated last year
- A memory scanner made in python for linux☆22Updated 4 years ago
- Slides and other material from various conference presentations.☆46Updated last month
- ☆48Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Our team's CTF writeups☆12Updated 5 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- Some CTF Write-ups☆25Updated 3 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 3 years ago