danghai / Security_ExploitLinks
☆26Updated 7 years ago
Alternatives and similar repositories for Security_Exploit
Users that are interested in Security_Exploit are comparing it to the libraries listed below
Sorting:
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 11 months ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- A collection of some interesting network security projects☆61Updated 7 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 4 years ago
- Capture The Flag competition challenge write-ups☆22Updated 2 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Cheat sheet of binary protections flags☆24Updated 5 years ago
- ☆68Updated 7 months ago
- Vulnerable docker images for CVE-2021-41773☆22Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- ☆21Updated 4 years ago
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- ☆57Updated 7 years ago
- ☆32Updated 6 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Updated 5 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- SSD Challenges☆48Updated 3 years ago
- Software Security course☆23Updated 10 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 4 months ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Updated 8 years ago
- Knowledge Base of Exploitation Techniques☆60Updated 9 months ago