🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.
☆23Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for BufferOverflowAttack
Users that are interested in BufferOverflowAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A new append-only-log for SSB purposes☆16Mar 15, 2023Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆43Oct 19, 2023Updated 2 years ago
- A microservice to anonymize strings☆16May 27, 2020Updated 5 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 3 years ago
- ☆33Apr 23, 2023Updated 3 years ago
- Only for educational purposes☆11Jun 17, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆38Jun 15, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 4 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 3 years ago
- A stop-loss liquidity pool to protect against directional risk.☆14Dec 8, 2023Updated 2 years ago
- Visualize your Spotify data and more.☆13Apr 4, 2024Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Splitting and executing shellcode across multiple pages☆105Jun 8, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆54Aug 22, 2022Updated 3 years ago
- A dynamic unpacking tool☆154Sep 17, 2023Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 7 months ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 3 years ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- ☆28Mar 31, 2023Updated 3 years ago
- 通过重造轮子和调用OpenSSL的方式学习密码!!☆15Jan 28, 2023Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆27Feb 16, 2026Updated 3 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆54May 21, 2020Updated 6 years ago