Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.
☆342Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for BlackHoodie-2018-Workshop
Users that are interested in BlackHoodie-2018-Workshop are comparing it to the libraries listed below
Sorting:
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- A Pwn2Own exploit chain☆756Nov 8, 2018Updated 7 years ago
- BSides Munich Frida Workshop 2018☆48Aug 8, 2018Updated 7 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 4 months ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- GTRS - Google Translator Reverse Shell☆624Sep 26, 2025Updated 5 months ago
- Slide decks from my conference presentations☆368Sep 30, 2023Updated 2 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,162Nov 14, 2020Updated 5 years ago
- Ephemera and other documentation associated with the 1337list project.☆397Jun 14, 2018Updated 7 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,616Dec 10, 2018Updated 7 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆940Nov 15, 2021Updated 4 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Kinda useful notes collated together publicly☆500May 29, 2019Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Code and exercises for a workshop on z3 and angr☆235Dec 29, 2020Updated 5 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago