atxsinn3r / VulnCases
Vulnerability examples.
☆403Updated 10 months ago
Alternatives and similar repositories for VulnCases:
Users that are interested in VulnCases are comparing it to the libraries listed below
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆143Updated 5 years ago
- OSEE Preparation☆173Updated 6 years ago
- ☆298Updated 2 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆340Updated 4 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆141Updated 3 years ago
- collect for learning cases☆577Updated 8 months ago
- A Binary Ninja plugin for vulnerability research.☆289Updated 6 months ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- Automatic exploit generation for simple linux pwn challenges.☆317Updated last year
- Exploitation and Mitigation Slides☆127Updated 9 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 2 years ago
- ☆183Updated 7 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆385Updated 2 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆579Updated 2 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆716Updated 4 months ago
- Detect, analyze and uniquely identify crashes in Windows applications☆502Updated 3 weeks ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- List of real-world threats against endpoint protection software☆215Updated 3 months ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Linux Heap Exploitation Practice☆378Updated 6 years ago
- Fork of mona.py with x64dbg support☆102Updated 2 years ago
- VerSprite Security Research☆165Updated 2 years ago
- A collection of pwn/CTF related utilities for Ghidra☆667Updated 6 months ago
- Using Intel's PIN tool to solve CTF problems☆497Updated 4 years ago
- esoteric☆51Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆815Updated 4 years ago
- Exploit Development, Reverse Engineering & Cryptography☆250Updated 4 years ago
- Useful tips by OTA CTF members☆138Updated 5 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆326Updated 2 years ago