kunalvarudkar / x86-Assembly-Language-and-Shellcoding-on-LinuxLinks
SLAE x86 from Pentester Academy
☆14Updated 6 years ago
Alternatives and similar repositories for x86-Assembly-Language-and-Shellcoding-on-Linux
Users that are interested in x86-Assembly-Language-and-Shellcoding-on-Linux are comparing it to the libraries listed below
Sorting:
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- ☆28Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Tools that I've created/used during CTP-OSCE☆10Updated 6 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- ☆36Updated 7 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- ☆20Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Work in Progress repo☆15Updated 6 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- android-inject-hook☆16Updated 7 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Malware Analysis Tools☆31Updated 6 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆29Updated 5 years ago
- ☆17Updated 2 years ago