Exploitation and Mitigation Slides
☆136Jun 4, 2024Updated last year
Alternatives and similar repositories for yookiterm-slides
Users that are interested in yookiterm-slides are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19May 23, 2019Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Linux Binary Exploitation☆1,358Jun 15, 2021Updated 4 years ago
- A Course on Intermediate Level Linux Exploitation☆1,012Aug 24, 2020Updated 5 years ago
- ☆18May 18, 2018Updated 7 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 8 months ago
- exploit code for a bpf heap overflow vulnerability☆27Sep 3, 2019Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- baseband security research☆84Apr 7, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,287Oct 7, 2022Updated 3 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆525Jun 28, 2024Updated last year
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,276Oct 12, 2022Updated 3 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux Heap Exploitation Practice☆394Dec 1, 2018Updated 7 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- ☆95Apr 2, 2019Updated 7 years ago
- GDB plugin peda for arm☆146Sep 29, 2025Updated 7 months ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 8 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,972Dec 9, 2021Updated 4 years ago
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- share some useful archives about vm and qemu escape exploit.☆589Mar 18, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆971Mar 14, 2022Updated 4 years ago
- ☆54Jul 13, 2015Updated 10 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago