This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course by RPISEC.
☆62Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for MBE-NOTES
Users that are interested in MBE-NOTES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- House of Gods Heap Exploitation Technique☆20Dec 5, 2022Updated 3 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆13Jan 12, 2022Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- GUI tool for sending IOCTL to windows drivers.☆21May 31, 2024Updated last year
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Function hooks in Windows NT Kernel☆26Oct 13, 2020Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆21Jan 11, 2022Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- ☆13Feb 18, 2021Updated 5 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Jul 1, 2023Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆18Jul 18, 2025Updated 9 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 3 months ago
- ☆11Oct 13, 2025Updated 6 months ago
- GPT fdisk partitioning tool for use under UEFI environments.☆16Nov 27, 2024Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆61Jun 15, 2025Updated 10 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- 🕵️ An android library to detect ADB debug☆17Jun 29, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Demo from the Malware Analysis and Development Webinar☆25Apr 17, 2024Updated 2 years ago
- Windows APT Warfare, published by Packt☆75Mar 11, 2023Updated 3 years ago
- A frozen version of angr for the SAILR paper☆16Sep 4, 2024Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 8 years ago
- Some of my windows kernel exploits for learning purposes☆137May 18, 2022Updated 3 years ago
- The Ultimate Guide to Pwning☆60Apr 4, 2018Updated 8 years ago
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploit code by DirtyChain☆15Apr 11, 2025Updated last year
- Remote Thread Detection with a Kernel Driver☆35Jan 14, 2025Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- Improved version of (@Ph4nton lol-dumper) by LeftSpace☆13May 21, 2023Updated 2 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 3 years ago