nnamon / linux-exploitation-course-2
A Course on Advanced Level Linux Exploitation
☆10Updated 6 years ago
Alternatives and similar repositories for linux-exploitation-course-2:
Users that are interested in linux-exploitation-course-2 are comparing it to the libraries listed below
- ☆13Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- ☆18Updated 5 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- ☆21Updated 5 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago
- Updated 6 years ago
- All challenges I created for CTF☆13Updated 3 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 10 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Fuzzing Framework☆10Updated 7 years ago
- ☆20Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 4 years ago
- Utilities for creating Burp Suite Extensions.☆21Updated 3 months ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- ☆44Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆39Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Security Advisories☆10Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago