My solutions to RPISEC's Modern Binary Exploitation course lab
☆14Mar 9, 2018Updated 7 years ago
Alternatives and similar repositories for mbe-solutions
Users that are interested in mbe-solutions are comparing it to the libraries listed below
Sorting:
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Some Pwn Challenges from winesap.☆14Aug 15, 2019Updated 6 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 3 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- Mentor🏋️ Mentee☆14Feb 18, 2019Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- x86 Microkernel☆15Apr 1, 2020Updated 5 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- CTF(x) 2016 problem statements, files, and writeups☆16Jan 30, 2019Updated 7 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- RFCs for changes to Rust☆13Jan 4, 2025Updated last year
- A tool to brute force forms based authentication mechanism☆11Nov 2, 2019Updated 6 years ago
- ☆11Feb 23, 2025Updated last year
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- Tasks from CTFZone 2017 quals☆12Jul 19, 2017Updated 8 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- ☆15May 1, 2023Updated 2 years ago
- VirusTotal API Library for Rust☆17Nov 3, 2019Updated 6 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- sample input data for zq☆15Nov 21, 2025Updated 3 months ago
- This is a book in Romanian on algorithms and programming contest strategies. It is written in LaTeX and TikZ. The original dates from 199…☆10Mar 31, 2018Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- ☆12Apr 25, 2020Updated 5 years ago
- A study on the automation of unpacking API wrapping in Themida☆12May 3, 2018Updated 7 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Diagrams of common HW/SW structures to help out all!☆16Apr 24, 2018Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago