anyaschukin / OverRideLinks
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆71Updated 4 years ago
Alternatives and similar repositories for OverRide
Users that are interested in OverRide are comparing it to the libraries listed below
Sorting:
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- ☆80Updated 10 months ago
- Slides and other material from various conference presentations.☆46Updated 3 months ago
- ☆73Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Presentations from the CX Security Labs team☆35Updated 5 months ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- ☆79Updated 2 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- A memory scanner made in python for linux☆22Updated 4 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆31Updated 4 years ago
- CVE-2022-0847☆51Updated 3 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 6 months ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆78Updated 8 months ago
- MacOSX Privilege Escalation Research☆30Updated 4 years ago
- ☆28Updated 4 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago