Basic Binary Exploitation / Buffer Overflows
☆11Jun 11, 2017Updated 8 years ago
Alternatives and similar repositories for Binary-Exploitation
Users that are interested in Binary-Exploitation are comparing it to the libraries listed below
Sorting:
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ☆10Oct 9, 2024Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Good For OSCP Training☆442Jan 26, 2019Updated 7 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- ☆18Aug 20, 2017Updated 8 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 2 weeks ago
- LastDesirePro - Rust cheat the 196-198 devblog (Pirate).☆15Sep 25, 2024Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Aug 8, 2020Updated 5 years ago
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- ☆10Jul 22, 2022Updated 3 years ago
- This is a template to create a responisive and mobile friendly website based on flask and python. Please like, fork and improve it on you…☆11Aug 21, 2022Updated 3 years ago
- ☆11Oct 12, 2024Updated last year
- 简书爬虫☆11Apr 15, 2021Updated 4 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Control de rele por protocolo HTTP Rest☆10Dec 8, 2021Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Open source Android apps☆11Sep 30, 2016Updated 9 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- This bot copies posts from /r/Python from Reddit and posts them to Twitter while keeping every safety measure in check.☆10Mar 28, 2016Updated 9 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- A light-weight HTTP proxy server written in Objective-C 【UNFINISHED】☆10Jul 28, 2016Updated 9 years ago
- ☆11Sep 11, 2024Updated last year
- Prototype of the HealthOS ventilation system☆14Mar 27, 2020Updated 5 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- 毕设,自己挖的一个坑☆11Aug 22, 2016Updated 9 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated last year