rustymagnet3000 / gdbLinks
gdb cheat sheet
☆24Updated 4 years ago
Alternatives and similar repositories for gdb
Users that are interested in gdb are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆100Updated 4 months ago
- ☆38Updated 2 years ago
- ☆50Updated 6 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆42Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- ☆37Updated 6 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆65Updated 2 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- Memory mapping profiles for forensic analysis using volatility 2☆48Updated 2 years ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆26Updated last month
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 6 months ago
- ASLR bypass without infoleak☆161Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆77Updated 7 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 4 months ago
- Analysis of the vulnerability☆51Updated last year
- Some of my windows kernel exploits for learning purposes☆129Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Slides and videos from my public speeches / conferences☆75Updated 3 weeks ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆99Updated 3 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆56Updated last year