anyaschukin / RainFallLinks
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆27Updated 4 years ago
Alternatives and similar repositories for RainFall
Users that are interested in RainFall are comparing it to the libraries listed below
Sorting:
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 7 months ago
- Random Exploits☆50Updated 2 years ago
- ☆48Updated 4 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- ☆20Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- Pentest stuff☆49Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- ☆44Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- ☆16Updated 6 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 4 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated last year
- Wordlists for intelligent directory brute-forcing☆32Updated 3 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆52Updated 4 months ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Target practice for ffuf☆67Updated 4 years ago