firmianay / Life-long-LearnerView external linksLinks
Personal Notes About Everything.
☆545May 6, 2021Updated 4 years ago
Alternatives and similar repositories for Life-long-Learner
Users that are interested in Life-long-Learner are comparing it to the libraries listed below
Sorting:
- Contains Attack labs☆152Jan 31, 2019Updated 7 years ago
- (与本人兴趣强相关的)各种安全or计算机资料收集☆752Apr 12, 2022Updated 3 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- ☆50Updated this week
- CTF竞赛权威指南☆4,441Jul 27, 2024Updated last year
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆11Apr 18, 2017Updated 8 years ago
- unbox - Unpack and Decompile the $h*! out of things☆47Mar 28, 2018Updated 7 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:…☆245May 18, 2019Updated 6 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- A collection of links related to Linux kernel security and exploitation☆6,337Jan 26, 2026Updated 2 weeks ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆523Jun 28, 2024Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Jan 7, 2016Updated 10 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,817Jun 8, 2019Updated 6 years ago
- awesome list of browser exploitation tutorials☆2,260Sep 18, 2023Updated 2 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- Android Kernel Exploitation☆638Feb 13, 2022Updated 4 years ago
- ☆28Jun 27, 2020Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- My slides☆89Nov 4, 2019Updated 6 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Jan 16, 2019Updated 7 years ago
- ☆26Jan 10, 2019Updated 7 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,544Oct 1, 2024Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- collection of ppt/pdf from security conferences☆19Apr 24, 2023Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,430Jan 15, 2026Updated last month