devzero2000 / shellcoderhandbook
shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"
☆74Updated 11 years ago
Alternatives and similar repositories for shellcoderhandbook:
Users that are interested in shellcoderhandbook are comparing it to the libraries listed below
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Published vulnerabilities and exploits.☆56Updated 2 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 5 months ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆93Updated 6 years ago
- Sourcecode created during my Livestream (English)☆112Updated 4 years ago
- CTF writeups☆112Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆96Updated 7 years ago
- ringzer0team challange solutions☆34Updated 9 years ago
- ☆89Updated 8 months ago
- The Zulu fuzzer☆125Updated 7 years ago
- some tasks/solutions from CTF challenges☆67Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 10 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆45Updated 7 years ago
- ☆141Updated 8 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements