π explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.
β23Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for BufferOverflowAttack
Users that are interested in BufferOverflowAttack are comparing it to the libraries listed below
Sorting:
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential riskβ¦β29Aug 13, 2023Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloadsβ23Jan 16, 2026Updated 2 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.β20Feb 2, 2024Updated 2 years ago
- MacroExploit use in excel sheetβ20Jun 12, 2023Updated 2 years ago
- A C# Tool to gather information about email breachesβ16Dec 21, 2023Updated 2 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicatβ¦β41Oct 19, 2023Updated 2 years ago
- A microservice to anonymize stringsβ16May 27, 2020Updated 5 years ago
- Select any exported function in a dll as the new dll's entry point.β82Oct 25, 2024Updated last year
- Discord giveaway bot using Deno.Kv queuesβ10Sep 12, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utilityβ14May 13, 2023Updated 2 years ago
- β33Apr 23, 2023Updated 2 years ago
- Only for educational purposesβ12Jun 17, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerabilityβ12Dec 31, 2024Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β38Jun 15, 2023Updated 2 years ago
- Some of my rough notes for Docker threat detectionβ50Aug 26, 2023Updated 2 years ago
- An easy-to-use password managerβ12Dec 1, 2025Updated 3 months ago
- β38Apr 7, 2023Updated 2 years ago
- Memory Scanerβ65Sep 9, 2022Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librarβ¦β15Dec 26, 2023Updated 2 years ago
- Dynamically install JavaScript modules on a microcontrollerβ17Feb 28, 2020Updated 6 years ago
- Mountain Protocol Tokenβ12Jan 10, 2024Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidatesβ11Jan 12, 2026Updated 2 months ago
- A LAPS dumper written using the impacket library.β32May 22, 2023Updated 2 years ago
- A stop-loss liquidity pool to protect against directional risk.β14Dec 8, 2023Updated 2 years ago
- Visualize your Spotify data and more.β13Apr 4, 2024Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.β55Apr 4, 2023Updated 2 years ago
- Run a command in parallel, distributing the input files to each.β18Jan 6, 2023Updated 3 years ago
- A library that provides manga-like shader for ThreeJSβ21Oct 9, 2023Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.β22Apr 17, 2024Updated last year
- Splitting and executing shellcode across multiple pagesβ103Jun 8, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the Fβ¦β26Oct 14, 2023Updated 2 years ago
- A dynamic unpacking toolβ149Sep 17, 2023Updated 2 years ago
- A National Vulnerability Database (NVD) API query toolβ17Jun 27, 2023Updated 2 years ago
- ζΌζ΄demoβ13Jun 10, 2021Updated 4 years ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheetβ29Oct 19, 2025Updated 5 months ago
- ICMPWatch: ICMP Packet Snifferβ57Oct 15, 2024Updated last year
- Dump Windows SAM hashesβ42Aug 9, 2023Updated 2 years ago
- β28Mar 31, 2023Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container securityβ16May 21, 2023Updated 2 years ago