sophieschmieg / exploitsLinks
☆13Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- QL Workshop☆16Updated 5 years ago
- ☆25Updated 3 months ago
- Regular expression Search on the command-line☆16Updated 2 months ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- ☆36Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Fuzz Network Traffic☆18Updated 5 months ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- Dockerfiles for (un)popular fuzzers!☆30Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago