danghai / Security_Exploit
☆26Updated 7 years ago
Alternatives and similar repositories for Security_Exploit:
Users that are interested in Security_Exploit are comparing it to the libraries listed below
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 7 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆27Updated 4 years ago
- Capture The Flag competition challenge write-ups☆20Updated last year
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆22Updated 10 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 4 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- ☆26Updated 4 years ago
- ☆24Updated 11 months ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Updated 5 years ago
- writeups for the past CTF challenges☆15Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 2 months ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆33Updated 8 years ago
- ☆68Updated 5 years ago
- labs for binary exploitation☆13Updated 5 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 3 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆18Updated 4 years ago
- Pwning notes☆47Updated 8 months ago
- esoteric☆52Updated 4 years ago
- A Course on Advanced Level Linux Exploitation☆10Updated 7 years ago
- A XPath injection demonstration application☆22Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 3 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Writeups for all the HTB machines I have done☆62Updated last year
- Technical Write-ups for the cyber security challenges on the web today☆15Updated 8 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Updated 8 years ago
- Penetration testing with shellcode codes☆28Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago