Learning material for completely newcomers in the field of BOFs
☆14Apr 11, 2020Updated 5 years ago
Alternatives and similar repositories for BOF-Basics
Users that are interested in BOF-Basics are comparing it to the libraries listed below
Sorting:
- Solution for cryptohack challenges☆21Oct 6, 2021Updated 4 years ago
- Cheat sheet of binary protections flags☆24Sep 6, 2020Updated 5 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Dec 21, 2020Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- for Raspberry Pi☆12Apr 30, 2020Updated 5 years ago
- Egy kis segítség számítógép architektúrák alapjaihoz☆12Sep 19, 2022Updated 3 years ago
- Template for the CryCollege library.☆12Jan 6, 2024Updated 2 years ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆25Feb 7, 2026Updated 3 weeks ago
- SDK for the Puzzle Wallet☆11Aug 12, 2025Updated 6 months ago
- ☆18Feb 13, 2026Updated 2 weeks ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- halo2-lib-eddsa☆11Feb 2, 2024Updated 2 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- My presentations home page☆10Jul 29, 2022Updated 3 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- ☆12Feb 8, 2021Updated 5 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- ☆13Mar 27, 2021Updated 4 years ago
- ☆10Feb 16, 2026Updated 2 weeks ago
- based on Differential Cryptanalysis of the Full 16-round DES(Eli Biham / Adi Shamir), all comments and report are written in Korean.☆10Dec 19, 2022Updated 3 years ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- CBC Bit-Flipping Attack Example with Python☆13Jun 14, 2023Updated 2 years ago
- X Developer Challenge☆11Apr 25, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- ☆71Nov 8, 2021Updated 4 years ago
- Repository for c++ sample codes and descriptions for C++☆33Nov 18, 2025Updated 3 months ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- generates unique subdomain names and runs httpx on them☆17Apr 8, 2024Updated last year
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago