danghai / Security_ExploitLinks
☆26Updated 7 years ago
Alternatives and similar repositories for Security_Exploit
Users that are interested in Security_Exploit are comparing it to the libraries listed below
Sorting:
- ☆26Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- A collection of some interesting network security projects☆62Updated 7 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- ☆21Updated 3 years ago
- ☆66Updated 5 years ago
- ☆20Updated 11 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Updated 8 years ago
- ☆64Updated last year
- My writeups of various CTFs & security challenges☆73Updated last month
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- buffer-overflow☆15Updated 3 years ago
- SSD Challenges☆48Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- An emulator/debugger/disassembler I made for 8080☆16Updated 7 years ago
- Material from presentations done by GoSecure researchers☆34Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- All CTF events☆75Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Software Security course☆21Updated 10 years ago
- Vulnerable docker images for CVE-2021-41773☆22Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 9 months ago