☆75Mar 24, 2021Updated 5 years ago
Alternatives and similar repositories for Buffer-Overflows
Users that are interested in Buffer-Overflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Jul 15, 2021Updated 4 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- Pakistan Cyber Security Challenge - 2023 CTF☆15Aug 14, 2025Updated 7 months ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆562Aug 19, 2020Updated 5 years ago
- ☆1,159Apr 21, 2021Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- OSCP Buffer Overflow cheat sheet☆181Aug 13, 2020Updated 5 years ago
- Don't let buffer overflows overflow your mind☆454Jun 3, 2020Updated 5 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- OSCP Buffer Overflow in 30 minutes☆37Jun 12, 2019Updated 6 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- wew oscp☆281Jun 28, 2022Updated 3 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Jan 21, 2020Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆1,396Apr 25, 2021Updated 4 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Mar 16, 2026Updated last week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆60Nov 22, 2019Updated 6 years ago
- ☆168Oct 21, 2023Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Opening the door, one reverse shell at a time☆185Apr 22, 2021Updated 4 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ARCHIVED: Use 'peh' instead☆16May 4, 2021Updated 4 years ago
- #100DaysOfCloud #100DaysOfCyberSecurity snippets starting from 28 SEPT 2022☆15Oct 17, 2022Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Useful commands/tricks using smbclient/nmap in a pentesting/auditing/redteaming☆115Apr 17, 2022Updated 3 years ago
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- Good For OSCP Training☆443Jan 26, 2019Updated 7 years ago