corelan / CorelanTrainingLinks
Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training
☆29Updated 3 weeks ago
Alternatives and similar repositories for CorelanTraining
Users that are interested in CorelanTraining are comparing it to the libraries listed below
Sorting:
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Collection of red machine learning projects☆41Updated 4 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last month
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- ☆64Updated last year
- various slides and presentations I've worked on☆19Updated 8 months ago
- Tools that I've created/used during CTP-OSCE☆10Updated 6 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 6 years ago
- ☆28Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- C# User Simulation☆33Updated 3 years ago
- ☆20Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Small fuzzing library with an example script using it.☆20Updated 4 years ago
- Different code-injections techniques under a common tool☆30Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- ☆24Updated 4 years ago
- ☆16Updated 5 years ago