kpcyrd / defcon26-pow
Fast defcon 26 quals pow solver
☆25Updated 6 years ago
Alternatives and similar repositories for defcon26-pow:
Users that are interested in defcon26-pow are comparing it to the libraries listed below
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- Small Rust programs that do weird things☆29Updated 3 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Binary (In)security tool☆25Updated 10 months ago
- ☆13Updated 4 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆36Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- ☆25Updated 5 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 5 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- The Alternative Fileless File System☆55Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆26Updated 5 years ago
- ☆36Updated 12 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆50Updated 6 years ago