Exploit Exercises for Security Researchers (arm, x86...)
☆13May 10, 2019Updated 6 years ago
Alternatives and similar repositories for zenysec-exploit-exercises
Users that are interested in zenysec-exploit-exercises are comparing it to the libraries listed below
Sorting:
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- All my public vulnerabilities.☆14Jan 9, 2021Updated 5 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- A kernel rootkit with remote command and control interface for windows☆108Jan 22, 2018Updated 8 years ago
- 8086 Assembly Chess☆11Feb 11, 2019Updated 7 years ago
- A simple kernel written in Rust for studying purposes.☆52May 6, 2018Updated 7 years ago
- An implementation of the Process Hollowing technique.☆16Dec 13, 2020Updated 5 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Such OS; Very Duck!☆15Feb 19, 2021Updated 5 years ago
- ☆11Sep 12, 2022Updated 3 years ago
- ☆33Sep 24, 2021Updated 4 years ago
- Reverse engineering project on stream☆13Mar 19, 2021Updated 5 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- An iOS open source project for the great site that gives you indication about the average iOS / MacOS app stores review times.☆14Mar 30, 2018Updated 7 years ago
- ☆11Dec 28, 2019Updated 6 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- AWS lambda functions - utilities☆12Jul 8, 2017Updated 8 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- A mansplaining tool for bourne-like shells☆11Feb 2, 2020Updated 6 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 10 years ago
- A suite of test ROMs for the Game Boy and Game Boy Color.☆11Sep 5, 2020Updated 5 years ago
- This is a vscode like theme for IDA 7.x with native theme support☆43Mar 15, 2021Updated 5 years ago
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Simple Protected Mode Kernel for i386☆15Dec 30, 2019Updated 6 years ago
- xnu exploitation toolkit☆16Apr 11, 2016Updated 9 years ago
- An automatic tool for fixing dumped PE files☆42Jul 28, 2020Updated 5 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Mar 22, 2020Updated 5 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- cppcast podcast website☆21Mar 5, 2023Updated 3 years ago