This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course by RPISEC.
☆55Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for MBE-NOTES
Users that are interested in MBE-NOTES are comparing it to the libraries listed below
Sorting:
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- how to get a few pwn points if you don't know how to pwn☆29Jul 6, 2019Updated 6 years ago
- House of Gods Heap Exploitation Technique☆19Dec 5, 2022Updated 3 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 7 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- Demo from the Malware Analysis and Development Webinar☆25Apr 17, 2024Updated last year
- Process Orchestration Framework: A camunda 7 fork☆21Mar 2, 2026Updated last week
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- ☆25Apr 28, 2024Updated last year
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Resources for Browser Security Research☆54Sep 17, 2022Updated 3 years ago
- Remote Thread Detection with a Kernel Driver☆34Jan 14, 2025Updated last year
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- A curated list of resources for the OSED journey.☆71Feb 3, 2022Updated 4 years ago
- ☆23Dec 30, 2025Updated 2 months ago
- Vulnerability analysis and proof of concepts☆40May 15, 2023Updated 2 years ago
- External Hack for Aura Kingdom TO☆14Feb 17, 2023Updated 3 years ago
- SDLC Copilot is an Agentic AI system designed to streamline and automate the Software Development Lifecycle (SDLC). From requirement gath…☆23Jun 14, 2025Updated 8 months ago
- Some of my windows kernel exploits for learning purposes☆137May 18, 2022Updated 3 years ago
- ☆36Oct 26, 2023Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆431May 2, 2024Updated last year
- ☆90Nov 25, 2024Updated last year
- A method to Disable DSE using .data ptr hooks☆39Feb 1, 2024Updated 2 years ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆43Mar 19, 2024Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- ☆39Dec 10, 2024Updated last year
- ☆39Jun 10, 2023Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆37Sep 26, 2023Updated 2 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- A standard-derived suite of cryptography libraries for the TI-84+ CE graphing calculator.☆14Jan 24, 2026Updated last month
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- Battleye Hardware ID Spoofer Kernel-Mode Driver + Visualizer☆18Aug 30, 2025Updated 6 months ago
- A Grand Sumo prediction game☆10Updated this week