Exploitation and Mitigation Slides
☆136Jun 4, 2024Updated last year
Alternatives and similar repositories for yookiterm-slides
Users that are interested in yookiterm-slides are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆19May 23, 2019Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- ☆18May 18, 2018Updated 7 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,285Oct 7, 2022Updated 3 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆446Apr 11, 2025Updated 11 months ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,276Oct 12, 2022Updated 3 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- GDB plugin peda for arm☆147Sep 29, 2025Updated 6 months ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,956Dec 9, 2021Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆213Jul 2, 2020Updated 5 years ago
- share some useful archives about vm and qemu escape exploit.☆583Mar 18, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆964Mar 14, 2022Updated 4 years ago
- ☆55Jul 13, 2015Updated 10 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago