iwalk-locksmithers-app / serverLinks
☆31Updated 6 years ago
Alternatives and similar repositories for server
Users that are interested in server are comparing it to the libraries listed below
Sorting:
- PwnAdventure3 Server☆654Updated 4 years ago
- ☆11Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- Vulnerability examples.☆412Updated last year
- A collection of resources that I've used to learn things☆14Updated 4 years ago
- Example pwnable challenge hosted with docker☆228Updated last year
- An archive of low-level CTF challenges developed over the years☆650Updated 4 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,422Updated 7 years ago
- Guía introductoria a la escritura de exploits☆70Updated 4 years ago
- OSEE Preparation☆191Updated 6 years ago
- Useful tips by OTA CTF members☆149Updated 6 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Updated 5 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- ☆23Updated 9 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆680Updated 6 years ago
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆138Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆622Updated 5 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆295Updated 4 months ago
- A Course on Intermediate Level Linux Exploitation☆1,006Updated 5 years ago
- Some security related notes☆461Updated 8 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Updated 5 years ago
- Repo containing links to all CTF Challenges used in the 2018 MITRE CTF. http://mitrecyberacademy.org/☆62Updated 7 years ago
- Material for the YouTube series☆511Updated 3 years ago
- Rashi Plus Plus - the new Hebrew scripting language☆93Updated 4 years ago
- A collection of pwn/CTF related utilities for Ghidra☆702Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆729Updated 6 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Updated 3 years ago
- CTF write-ups / solution scripts☆23Updated 7 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Updated last year