redcanaryco / exploit-primitive-playgroundLinks
☆64Updated last year
Alternatives and similar repositories for exploit-primitive-playground
Users that are interested in exploit-primitive-playground are comparing it to the libraries listed below
Sorting:
- Vulnerabilities, exploits, and PoCs☆37Updated 3 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- ☆28Updated 6 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆28Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- ☆18Updated 5 years ago
- ☆48Updated 5 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ☆24Updated last year
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Google Chrome Use After Free☆59Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- ☆27Updated 3 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Tools that trigger False Positive AV alerts☆50Updated 8 months ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 2 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆45Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆65Updated 2 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- autopwn + deployment☆15Updated 3 years ago