rootkiter / phrackLinks
www.phrack.org
☆78Updated 2 years ago
Alternatives and similar repositories for phrack
Users that are interested in phrack are comparing it to the libraries listed below
Sorting:
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆20Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- ☆65Updated 8 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆72Updated 5 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- ☆36Updated 7 years ago
- ☆34Updated 9 years ago
- hax 'n shit☆121Updated 10 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- ☆54Updated 8 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Copy of the contents at phrack.com☆40Updated 7 months ago
- UAC 0Day all day!☆57Updated 8 years ago
- public exploits☆35Updated 2 years ago