Advanced buffer overflow and memory corruption security challenges
☆190Feb 18, 2022Updated 4 years ago
Alternatives and similar repositories for AdvancedMemoryChallenges
Users that are interested in AdvancedMemoryChallenges are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- ICMP ECHO Ping with Gevent☆21Jul 28, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- ☆15Dec 26, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- A command line Hash Identifying tool.☆101Mar 17, 2019Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Nov 23, 2015Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- everything in one place - the best description I could come up with ;)☆27Jun 24, 2020Updated 5 years ago
- The Windows driver and device management program for NDAS devices such as the NetDISK.☆16Jun 17, 2016Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- ☆69Aug 19, 2014Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago