cris-m / Buffer-Overflow-Exploit-DevelopmentLinks
This repo explains in details about buffer overflow exploit development for windows executable.
☆43Updated last year
Alternatives and similar repositories for Buffer-Overflow-Exploit-Development
Users that are interested in Buffer-Overflow-Exploit-Development are comparing it to the libraries listed below
Sorting:
- Practice Labs☆92Updated 4 years ago
- Gonna share my writeups and resources here☆65Updated 5 months ago
- ☆44Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆104Updated 3 years ago
- Resources and exploits made for OSWE preparation.☆40Updated 2 years ago
- ☆60Updated 3 years ago
- An OSWE Guide☆117Updated 4 years ago
- ☆75Updated 3 years ago
- Templates for submissions☆78Updated last year
- 0xbro's cheatsheets and CTFs notes☆54Updated 3 weeks ago
- ☆66Updated 3 years ago
- ☆63Updated 4 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆42Updated last year
- ☆27Updated 5 years ago
- ☆131Updated 4 years ago
- ☆99Updated 3 years ago
- OSCP notes☆54Updated 4 years ago
- ☆48Updated last year
- ☆105Updated 2 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆43Updated 4 years ago
- ☆38Updated 4 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆40Updated 4 years ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆59Updated 5 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆24Updated last year
- tools, files, and scripts I use for PNPT and CRTO☆20Updated 3 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆144Updated 3 years ago
- Study notes to get eCPPT Certification. Join the community on Discord☆17Updated last year
- Useful tips and resources for preparing for the AWAE exam.☆116Updated 3 years ago
- Some handy bash scripts I used for the OSCP☆23Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated last month