Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
☆295Sep 19, 2017Updated 8 years ago
Alternatives and similar repositories for InsecureProgramming
Users that are interested in InsecureProgramming are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Guía introductoria a la escritura de exploits☆70Mar 2, 2021Updated 5 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- asrepl: x86-64 assembly REPL☆71Apr 13, 2017Updated 8 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Oct 20, 2020Updated 5 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Aug 11, 2023Updated 2 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Simple Kernel Extension to read and write Kernel Memory☆15Aug 18, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,956Dec 9, 2021Updated 4 years ago
- Wrap handlers to use pull-stream in a choo plugin☆15May 11, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A browsable archive of all Underhanded Crypto Contest entries.☆34Jun 5, 2019Updated 6 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- 'SWEETMON2' is a fuzzer monitoring service based Python3 + Django2. User can manage their fuzzers and crashes on the web. It can reduce r…☆10Jun 5, 2020Updated 5 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- ☆15May 6, 2021Updated 4 years ago
- ☆12Nov 2, 2022Updated 3 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A repository for learning various heap exploitation techniques.☆8,530Mar 21, 2026Updated last week
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- List of crackpot 'scientists' and 'thinkers'☆20Jun 22, 2025Updated 9 months ago
- kj is a small collection of stb inspired libs.☆18Apr 5, 2018Updated 7 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- WebAssembly Types☆17Aug 11, 2017Updated 8 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆351Mar 13, 2026Updated 2 weeks ago
- Trying to hack into keyboards☆86Nov 29, 2018Updated 7 years ago
- ☆10Sep 25, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- ☆18May 3, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago