anyaschukin / RainFallLinks
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆28Updated 4 years ago
Alternatives and similar repositories for RainFall
Users that are interested in RainFall are comparing it to the libraries listed below
Sorting:
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 10 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Pentest stuff☆49Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 5 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- ☆20Updated 4 years ago
- ☆49Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Wordlists for intelligent directory brute-forcing☆32Updated 4 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Updated 6 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆78Updated 5 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆62Updated 2 years ago
- ☆28Updated 6 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated last year
- ☆44Updated 4 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- Knowledge Base of Exploitation Techniques☆58Updated 7 months ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- ☆23Updated 4 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago