muhammet-mucahit / Security-Exercises
Buffer Overflow Exploitation Examples
☆43Updated 6 years ago
Alternatives and similar repositories for Security-Exercises:
Users that are interested in Security-Exercises are comparing it to the libraries listed below
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- ☆50Updated 6 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- ☆83Updated 7 years ago
- Programming course for Wannabes☆41Updated 3 months ago
- Random Exploits☆50Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- esoteric☆52Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 2 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- Gonna share my writeups and resources here☆65Updated 3 months ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆36Updated 4 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Updated 8 years ago
- Pwning notes☆47Updated 8 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆84Updated last year
- Presentaciones de congresos☆52Updated 10 months ago
- CTF scripts and writeups (mostly challenge + .py solving script)☆23Updated 4 months ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- Assembly language files and Shellcode☆34Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago