Exploitation and Mitigation Slides
☆136Jun 4, 2024Updated last year
Alternatives and similar repositories for yookiterm-slides
Users that are interested in yookiterm-slides are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- ☆19May 23, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- ☆18May 18, 2018Updated 7 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- exploit code for a bpf heap overflow vulnerability☆27Sep 3, 2019Updated 6 years ago
- baseband security research☆84Apr 7, 2021Updated 5 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,283Oct 7, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆524Jun 28, 2024Updated last year
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆448Apr 11, 2025Updated last year
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,276Oct 12, 2022Updated 3 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆95Apr 2, 2019Updated 7 years ago
- GDB plugin peda for arm☆147Sep 29, 2025Updated 6 months ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 8 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,964Dec 9, 2021Updated 4 years ago
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- share some useful archives about vm and qemu escape exploit.☆588Mar 18, 2026Updated last month
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆965Mar 14, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆54Jul 13, 2015Updated 10 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- ☆69Jul 26, 2021Updated 4 years ago