Personal Notes About Everything.
☆549May 6, 2021Updated 4 years ago
Alternatives and similar repositories for Life-long-Learner
Users that are interested in Life-long-Learner are comparing it to the libraries listed below
Sorting:
- (与本人兴趣强相关的)各种安全or计算机资料收集☆754Apr 12, 2022Updated 3 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- ☆50Feb 14, 2026Updated 3 weeks ago
- CTF竞赛权威指南☆4,448Jul 27, 2024Updated last year
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:…☆246May 18, 2019Updated 6 years ago
- GDB for pwn☆11Sep 10, 2025Updated 6 months ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- A collection of links related to Linux kernel security and exploitation☆6,368Updated this week
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Jul 27, 2022Updated 3 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Jan 7, 2016Updated 10 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- awesome list of browser exploitation tutorials☆2,266Sep 18, 2023Updated 2 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- Android Kernel Exploitation☆639Feb 13, 2022Updated 4 years ago
- ☆28Jun 27, 2020Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- My slides☆89Nov 4, 2019Updated 6 years ago
- ☆26Jan 10, 2019Updated 7 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Jan 16, 2019Updated 7 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,547Oct 1, 2024Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- Linux Binary Exploitation☆1,357Jun 15, 2021Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- collection of ppt/pdf from security conferences☆19Feb 25, 2026Updated last week
- Course materials for Modern Binary Exploitation by RPISEC☆5,939Dec 9, 2021Updated 4 years ago