hellosputnik / exploit-exercises
exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com
☆31Updated 6 years ago
Alternatives and similar repositories for exploit-exercises:
Users that are interested in exploit-exercises are comparing it to the libraries listed below
- Setup for a pwning VM☆60Updated 6 years ago
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 3 months ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Personal repository for all ctf related stuffs☆67Updated 3 months ago
- ☆122Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 2 years ago
- CTF write-ups / solution scripts☆23Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 3 months ago
- ☆36Updated 6 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆144Updated 7 years ago
- ☆93Updated 6 years ago
- Published vulnerabilities and exploits.☆55Updated last year
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆50Updated 8 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Make ARM Shellcode Great Again☆62Updated 3 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago