tom0682 / Buffer-Overflow-offsec-styleLinks
A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.
☆10Updated 6 years ago
Alternatives and similar repositories for Buffer-Overflow-offsec-style
Users that are interested in Buffer-Overflow-offsec-style are comparing it to the libraries listed below
Sorting:
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 3 weeks ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Updated 5 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Updated 8 years ago
- pentestscripts☆16Updated 6 years ago
- All the useful tools interesting to be used☆24Updated 3 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- ☆18Updated 5 years ago
- ☆15Updated 7 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Updated 3 years ago
- ☆30Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- ☆21Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Commands used in Windows penetration tests☆55Updated 2 weeks ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆33Updated last year
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Updated 2 months ago
- A toolkit to attack Office365☆16Updated 6 years ago
- Notes and Commands for CTFs☆22Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- ☆13Updated 3 years ago
- ☆10Updated 5 years ago