muhammet-mucahit / Security-ExercisesView external linksLinks
Buffer Overflow Exploitation Examples
☆47May 17, 2018Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below
Sorting:
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- ☆18Nov 18, 2020Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 7 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆26May 7, 2020Updated 5 years ago
- ☆24Nov 16, 2023Updated 2 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆26Jun 29, 2017Updated 8 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- İnstagram Clone.You can sign in, sign up, upload image, make comment 📷 Used ReactJS, Material UI, Firebase, Firestore Database☆22May 21, 2021Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- dork scanner with Sqli and Lfi testing☆28Apr 29, 2018Updated 7 years ago
- ☆10Aug 9, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Python script to launch burp scans automatically☆33Jul 18, 2021Updated 4 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- Dump certificates from PE files in different formats☆38Dec 25, 2023Updated 2 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- Public repository of the UCSC CMPE220 class project☆10Oct 8, 2017Updated 8 years ago
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- A simple 8086-CPU simulator using Verilog and Quartus II☆10Jul 9, 2018Updated 7 years ago
- BadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit☆36Mar 9, 2019Updated 6 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- ☆13May 9, 2023Updated 2 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 4 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago