Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.
☆343Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for BlackHoodie-2018-Workshop
Users that are interested in BlackHoodie-2018-Workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 8 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- A Pwn2Own exploit chain☆758Nov 8, 2018Updated 7 years ago
- BSides Munich Frida Workshop 2018☆48Aug 8, 2018Updated 7 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,967Dec 9, 2021Updated 4 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- A Course on Intermediate Level Linux Exploitation☆1,012Aug 24, 2020Updated 5 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 5 months ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆120Apr 19, 2018Updated 8 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Exploitation challenges for CTF☆64Feb 13, 2018Updated 8 years ago
- GTRS - Google Translator Reverse Shell☆626Sep 26, 2025Updated 7 months ago
- ☆36Oct 27, 2019Updated 6 years ago
- Slide decks from my conference presentations☆369Sep 30, 2023Updated 2 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PowerShell example of the Windows zero day priv esc☆327Sep 12, 2018Updated 7 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,164Nov 14, 2020Updated 5 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Jun 14, 2018Updated 7 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,614Dec 10, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆947Nov 15, 2021Updated 4 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Kinda useful notes collated together publicly☆501May 29, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆478Apr 8, 2021Updated 5 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Code and exercises for a workshop on z3 and angr☆235Dec 29, 2020Updated 5 years ago