Basic Binary Exploitation / Buffer Overflows
☆11Jun 11, 2017Updated 8 years ago
Alternatives and similar repositories for Binary-Exploitation
Users that are interested in Binary-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- Good For OSCP Training☆443Jan 26, 2019Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Sep 3, 2022Updated 3 years ago
- ☆19Aug 20, 2017Updated 8 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated this week
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆11Oct 12, 2024Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Open source Android apps☆11Sep 30, 2016Updated 9 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Aug 8, 2020Updated 5 years ago
- Local GOLANG Transform Wrapper for Maltego☆17Feb 25, 2016Updated 10 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆11Jun 11, 2025Updated 9 months ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- A simple TypeScript credit card generator☆11Jul 22, 2022Updated 3 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- ☆13Sep 21, 2021Updated 4 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago