☆81Oct 15, 2017Updated 8 years ago
Alternatives and similar repositories for Binary-exploit-writeups
Users that are interested in Binary-exploit-writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Udemy – Linux Heap Exploitation☆55Jun 14, 2021Updated 4 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- ☆201Jan 1, 2018Updated 8 years ago
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- ☆25Dec 3, 2024Updated last year
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- ☆111Dec 30, 2019Updated 6 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- esoteric☆57Sep 9, 2020Updated 5 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Kernel PWN Tooklkit aimed mainly for CTF players☆18Jul 31, 2024Updated last year
- Collection of resources for my preparation to take the OSEE certification.☆308Sep 9, 2020Updated 5 years ago
- ☆318Apr 8, 2022Updated 3 years ago
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Feb 26, 2026Updated 3 weeks ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Mar 11, 2026Updated last week
- ☆15May 2, 2024Updated last year
- Malware Analysis Tools☆32Oct 26, 2019Updated 6 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆34Feb 9, 2018Updated 8 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year