tom0682 / Buffer-Overflow-offsec-style
A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.
☆10Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Buffer-Overflow-offsec-style
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- ☆29Updated 5 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 5 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- A location where I save and share notes about security topics.☆11Updated 4 years ago
- A collection of scripts from around the web to be used with OSCP☆11Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 4 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Scripts I have made for blue team☆16Updated 6 years ago
- ☆19Updated 4 years ago
- ☆14Updated 6 years ago
- Miscellaneous for various things☆22Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 4 years ago
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- HoneyDB Python Module☆13Updated 9 months ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆18Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 8 years ago
- buffer overflow examples☆21Updated 6 years ago
- ☆12Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago