whatsyourask / basics-of-pwn
My course work about basic binary exploitation.🤿
☆3Updated 3 years ago
Alternatives and similar repositories for basics-of-pwn:
Users that are interested in basics-of-pwn are comparing it to the libraries listed below
- ☆9Updated 2 years ago
- CTF Writeups☆25Updated 7 months ago
- Gonna share my writeups and resources here☆64Updated 2 months ago
- Stack Based buffer overflow attack☆19Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- purplestorm writeup collection☆17Updated this week
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated last year
- ☆36Updated last year
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆25Updated 9 months ago
- ☆32Updated last month
- A collection of my adventures through hackthebox.eu☆32Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).☆50Updated 2 years ago
- Some CTF writeups written by meeeeeee☆8Updated 11 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Challenges & author writeups from ZeroDays CTF 2025.☆64Updated last week
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 2 months ago
- ☆60Updated 2 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆39Updated 4 months ago