iagox86 / ctfworkshop-2017
☆28Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ctfworkshop-2017
- ☆21Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 6 years ago
- ☆14Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆55Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 6 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- ☆29Updated 8 years ago
- ☆96Updated 3 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 5 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 5 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago