fundacion-sadosky / abopp
Ejercicios y teoría sobre explotación de binarios y búsqueda de vulnerabilidades.
☆40Updated 5 years ago
Alternatives and similar repositories for abopp:
Users that are interested in abopp are comparing it to the libraries listed below
- Guía introductoria a la escritura de exploits☆68Updated 3 years ago
- ☆20Updated 4 years ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆258Updated 7 years ago
- RWX CTF Team Writeups☆10Updated 5 years ago
- CTF write-ups repository☆42Updated last year
- EKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con …☆51Updated 2 years ago
- c0r0n4con talk 12 april 2020☆23Updated 4 years ago
- Recursos para iniciarse en seguridad informática. Compilados por DCcurity (grupo de estudiantes interesados en seguridad informática del …☆30Updated 3 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- Challenges and vulnerabilities exploitation.☆58Updated 4 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- ☆152Updated 2 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- QL Workshop☆16Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated 11 months ago
- ☆13Updated 2 years ago
- ASYRV es una aplicación escrita en PHP/MySQL, con Servicios Web mal desarrollados(SOAP/REST/XML), esperando ayudar a los entusiastas de l…☆23Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated last month
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- esoteric☆51Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆140Updated 3 years ago
- CTF Writeups