tharina / BlackHoodie-2018-WorkshopView external linksLinks
Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.
☆342Nov 24, 2018Updated 7 years ago
Alternatives and similar repositories for BlackHoodie-2018-Workshop
Users that are interested in BlackHoodie-2018-Workshop are comparing it to the libraries listed below
Sorting:
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- A Pwn2Own exploit chain☆757Nov 8, 2018Updated 7 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Slide decks from my conference presentations☆367Sep 30, 2023Updated 2 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Jun 14, 2018Updated 7 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,924Dec 9, 2021Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆625Sep 26, 2025Updated 4 months ago
- Kinda useful notes collated together publicly☆501May 29, 2019Updated 6 years ago
- Fuzzing Browsers☆315Dec 5, 2022Updated 3 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆118Apr 19, 2018Updated 7 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- A Course on Intermediate Level Linux Exploitation☆1,007Aug 24, 2020Updated 5 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,612Dec 10, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆278Nov 3, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,003Jan 15, 2019Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- ☆523Feb 22, 2020Updated 5 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- ☆86Oct 29, 2023Updated 2 years ago