vital-information-resource-under-siege / PWN-Challenges
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
☆20Updated last month
Alternatives and similar repositories for PWN-Challenges:
Users that are interested in PWN-Challenges are comparing it to the libraries listed below
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- Ansible build for Afl++ Frida-Mode☆23Updated 9 months ago
- ☆26Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆56Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Random Exploits☆50Updated last year
- ☆47Updated 6 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- ☆32Updated last month
- OSED Practice binary☆24Updated last year
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆24Updated 4 years ago
- Gonna share my writeups and resources here☆64Updated 2 months ago
- Reverse Shell troll software☆12Updated 5 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- an Evil Java RMI Registry.☆49Updated 2 years ago
- Vulnerable Windows Application☆15Updated last year
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆22Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆59Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆20Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- CVE's we discovered along the way☆16Updated 3 years ago
- ☆9Updated 10 months ago
- Stack Based buffer overflow attack☆19Updated last year