nnamon / PracticalRet2LibcLinks
Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.
☆53Updated 9 years ago
Alternatives and similar repositories for PracticalRet2Libc
Users that are interested in PracticalRet2Libc are comparing it to the libraries listed below
Sorting:
- Manage building and deploying exploitation challenges with ease☆59Updated 2 months ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆88Updated 7 years ago
- VoidHack CTF write-ups☆60Updated 6 years ago
- ctf101 systems security repository☆26Updated 4 years ago
- Exploiting challenges in Linux and Windows☆120Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 8 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- Exploitation and Mitigation Slides☆135Updated last year
- Erised Reverse Engineering and Exploitation Training Sessions☆37Updated 9 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆148Updated 9 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- 🏴 Collection of CTF solutions☆74Updated 6 years ago
- ☆28Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Updated 8 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆101Updated 3 months ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Updated 2 years ago