Buffer Overflow Exploitation Examples
☆48May 17, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- ☆10Feb 22, 2023Updated 3 years ago
- Automatically find certain gems in King of Thieves☆10May 15, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- ☆19Jun 16, 2023Updated 2 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 6 months ago
- Simple vulnearable Flask web application☆30Dec 30, 2025Updated 3 months ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Daily C2 threat intelligence feed☆19Updated this week
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆13Jun 5, 2020Updated 5 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Backwards compatible callback APIs☆19Jun 9, 2020Updated 5 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- ☆18Nov 18, 2020Updated 5 years ago
- Great security list for fun and profit☆29Jul 24, 2017Updated 8 years ago
- SlamDunk's LOIC in Python☆29Dec 29, 2010Updated 15 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python obfuscation for the average lambda enjoyer☆16Jun 15, 2023Updated 2 years ago
- XRP paper wallet for xrp cold storage☆30Aug 15, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- https://exploit-exercises.com/fusion/☆20Dec 29, 2015Updated 10 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- A python3 module that converts your bs4 Tag into json object (dict)☆16Mar 17, 2026Updated 3 weeks ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 24, 2026Updated 2 weeks ago
- Flask/Vue template for creating wordle variations☆21Nov 17, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆22Apr 28, 2025Updated 11 months ago
- ☆12Mar 24, 2018Updated 8 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago