A New Exploitation Technique for Visual Studio Projects
☆45Oct 11, 2023Updated 2 years ago
Alternatives and similar repositories for EvilSln
Users that are interested in EvilSln are comparing it to the libraries listed below
Sorting:
- ☆11Sep 1, 2023Updated 2 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Released code from BSidesSF CTF 2023☆18Aug 8, 2023Updated 2 years ago
- Contains challenges, write-ups, and deployment configurations from b01lersCTF 2023.☆12Apr 3, 2023Updated 2 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- can convert EXE/DLL into position-independent shellcode☆40Feb 1, 2026Updated last month
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- ☆21Dec 24, 2022Updated 3 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- Slides for presentations held at conferences☆47Jan 2, 2023Updated 3 years ago
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆26Feb 3, 2023Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- ☆37Nov 8, 2024Updated last year
- Upload of all challenges from idekCTF 2022☆25Jan 20, 2023Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- The official challenges and deployment source code files used in San Diego CTF 2022.☆28May 14, 2022Updated 3 years ago
- ☆31Dec 29, 2022Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 3 months ago
- ☆30Dec 11, 2025Updated 2 months ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- ☆32Apr 14, 2023Updated 2 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Challenges, source code, and writeups for BYUCTF 2023☆27May 24, 2023Updated 2 years ago
- public archive for corCTF 2022☆37Aug 16, 2022Updated 3 years ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆182Dec 23, 2025Updated 2 months ago
- Plugx 开源情报集合☆23Dec 10, 2024Updated last year
- ☆37May 10, 2024Updated last year
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆55Jul 1, 2023Updated 2 years ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- ☆40Feb 3, 2026Updated last month
- ☆38Jan 13, 2023Updated 3 years ago
- A pre-authenticated RCE exploit for Inductive Automation Ignition☆48Jul 18, 2022Updated 3 years ago