hellosputnik / exploit-exercises
exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com
☆31Updated 6 years ago
Alternatives and similar repositories for exploit-exercises:
Users that are interested in exploit-exercises are comparing it to the libraries listed below
- Exploitation challenges for CTF☆62Updated 7 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 4 months ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Fork of mona.py with x64dbg support☆102Updated 2 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆117Updated 4 months ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Radare 2 wiki☆91Updated 4 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- 🏴 Collection of CTF solutions☆75Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- ☆93Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆83Updated 4 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 4 months ago
- ☆33Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆88Updated 10 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- ☆88Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago