danghai / Security_ExploitLinks
☆26Updated 7 years ago
Alternatives and similar repositories for Security_Exploit
Users that are interested in Security_Exploit are comparing it to the libraries listed below
Sorting:
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆22Updated 6 months ago
- ☆68Updated 5 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 4 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- Linux kernel exploits for local privilege escalation☆79Updated 6 years ago
- Double-Free BUG in WhatsApp exploit poc.☆96Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- An emulator/debugger/disassembler I made for 8080☆16Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- ☆26Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- My writeups of various CTFs & security challenges☆73Updated last year
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- ☆30Updated 5 years ago
- ☆13Updated 5 years ago
- Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Updated 4 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 5 months ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- ☆26Updated 4 years ago