croemheld / hacking-art-of-exploitationLinks
Source files and summarized reports for some of the chapters and examples in the book.
☆20Updated 8 years ago
Alternatives and similar repositories for hacking-art-of-exploitation
Users that are interested in hacking-art-of-exploitation are comparing it to the libraries listed below
Sorting:
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- ☆36Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- CTF Writeups☆26Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- material for exploit development☆17Updated 6 years ago
- Tools that I've created/used during CTP-OSCE☆10Updated 6 years ago
- miscellaneous stuff☆21Updated 10 years ago
- ☆21Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Updated 13 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- ☆53Updated last year
- ☆22Updated 8 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- only for 31337☆24Updated 9 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago