muhammet-mucahit / Security-Exercises
Buffer Overflow Exploitation Examples
☆43Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below
Sorting:
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 3 months ago
- OSCP Prep notes☆12Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆27Updated 4 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- All CTF events☆75Updated 3 years ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆45Updated 2 years ago
- ☆83Updated 7 years ago
- An arXiv for, what I think, are the finest in hacker works☆113Updated 5 months ago
- CTF scripts and writeups (mostly challenge + .py solving script)☆23Updated 5 months ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆44Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆69Updated 2 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Assembly language files and Shellcode☆34Updated 3 years ago
- ☆67Updated 3 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 4 years ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- OS Command Execution☆25Updated 6 years ago
- Gonna share my writeups and resources here☆66Updated 4 months ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- ☆26Updated 3 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 5 months ago