papadoxie / cronOSLinks
My attempt at writing an Operating System from scratch
☆13Updated 2 years ago
Alternatives and similar repositories for cronOS
Users that are interested in cronOS are comparing it to the libraries listed below
Sorting:
- SigSegv2 CTFd theme☆10Updated 4 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated 3 weeks ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 4 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Gonna share my writeups and resources here☆65Updated 5 months ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated 2 years ago
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 5 months ago
- ☆9Updated 2 years ago
- CATANA - CUT your Wordlist!☆14Updated 2 years ago
- Mnemonic Cryptography☆17Updated 2 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- A python approach to interacting with web shells.☆31Updated 4 years ago
- ☆14Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 2 years ago
- x86_64 LKM linux rootkit☆16Updated last year
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.