Buffer Overflow Exploitation Examples
☆48May 17, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below
Sorting:
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 8 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- Solutions to and walkthroughs for ROPemporium.com challenges☆18Nov 13, 2018Updated 7 years ago
- ☆19Jun 16, 2023Updated 2 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆60Feb 27, 2026Updated 3 weeks ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- Daily C2 threat intelligence feed☆19Updated this week
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- ☆18Nov 18, 2020Updated 5 years ago
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- XRP paper wallet for xrp cold storage☆30Aug 15, 2018Updated 7 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- ☆33May 16, 2018Updated 7 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A wireshark dissector for Mode-S aircraft transmissions☆14May 25, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆26May 7, 2020Updated 5 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- WordPress version identification and vulnerability finder.☆31Oct 4, 2022Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆26Jun 29, 2017Updated 8 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago