dannyc-dev / Building-the-ROP-Chain
Part 2 of our Stack Based Buffer Overflow series. Building the ROP chain.
☆13Updated 3 years ago
Alternatives and similar repositories for Building-the-ROP-Chain
Users that are interested in Building-the-ROP-Chain are comparing it to the libraries listed below
Sorting:
- Set of useful scrpts☆10Updated 10 years ago
- Tiny research project to understand code injections on Linux based systems☆13Updated 7 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆12Updated 7 years ago
- ☆10Updated 7 years ago
- ☆14Updated 9 years ago
- ☆22Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- ☆13Updated 5 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- ☆10Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆18Updated 7 years ago
- ☆36Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It c…☆7Updated 8 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- A new technique to bypass microsoft's applocker.☆12Updated 9 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- ☆42Updated 6 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- ☆20Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 8 years ago