This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course by RPISEC.
☆62Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for MBE-NOTES
Users that are interested in MBE-NOTES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- House of Gods Heap Exploitation Technique☆20Dec 5, 2022Updated 3 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Function hooks in Windows NT Kernel☆26Oct 13, 2020Updated 5 years ago
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- ☆25Apr 28, 2024Updated last year
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆36Feb 4, 2026Updated 2 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Jul 1, 2023Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 9 months ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- ☆11Oct 13, 2025Updated 6 months ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆60Jun 15, 2025Updated 10 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- External Hack for Aura Kingdom TO☆14Feb 17, 2023Updated 3 years ago
- Demo from the Malware Analysis and Development Webinar☆25Apr 17, 2024Updated 2 years ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows APT Warfare, published by Packt☆75Mar 11, 2023Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,964Dec 9, 2021Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Resources for Browser Security Research☆57Sep 17, 2022Updated 3 years ago
- Some of my windows kernel exploits for learning purposes☆137May 18, 2022Updated 3 years ago
- Simple single file header for creating zero imports drivers. Can be useful for bypassing forensic memory analysis performed by anticheats…☆20Jun 10, 2025Updated 10 months ago
- Exploit code by DirtyChain☆14Apr 11, 2025Updated last year
- ☆14Jul 27, 2024Updated last year
- Remote Thread Detection with a Kernel Driver☆33Jan 14, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- Lua assembly toolkit☆19Feb 3, 2016Updated 10 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆31May 24, 2020Updated 5 years ago
- Linux kernel exploitation experiments☆398Apr 8, 2026Updated last week
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago