Buffer Overflow Exploitation Examples
☆48May 17, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Automatically find certain gems in King of Thieves☆10May 15, 2025Updated 11 months ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- my zsh theme☆11Sep 14, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Process Hollowing Detection on a live system☆14Nov 11, 2017Updated 8 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Solutions to and walkthroughs for ROPemporium.com challenges☆18Nov 13, 2018Updated 7 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Backwards compatible callback APIs☆19Jun 9, 2020Updated 5 years ago
- Hardening script for Windows (Domain mode or without domain)☆16Sep 18, 2025Updated 7 months ago
- ☆18Nov 18, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- This is a small parser library for parsing the `blok_payload` field of Instagram / Threads API responses.☆14May 20, 2025Updated 11 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Good For OSCP Training☆444Jan 26, 2019Updated 7 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Tool to extract & validate google fcm server keys from apks☆29Jan 20, 2021Updated 5 years ago
- lightweight CVE search☆22Dec 24, 2025Updated 4 months ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 24, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Comment scraper un site web avec python 3☆11Sep 17, 2019Updated 6 years ago
- This is my final project for my Artificial Intelligence class. I generated pattern databases of subsets of the Rubik's cube via a breadt…☆11May 31, 2018Updated 7 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆27May 7, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Play wordlists at encrypted Exodus wallets to recover wallet password☆12Jul 7, 2021Updated 4 years ago
- WordPress version identification and vulnerability finder.☆32Apr 21, 2026Updated last week
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- ☆23Dec 15, 2022Updated 3 years ago