whatsyourask / basics-of-pwn
My course work about basic binary exploitation.🤿
☆4Updated 3 years ago
Alternatives and similar repositories for basics-of-pwn:
Users that are interested in basics-of-pwn are comparing it to the libraries listed below
- CTF Writeups☆25Updated 8 months ago
- ☆37Updated last year
- Gonna share my writeups and resources here☆65Updated 3 months ago
- Stack Based buffer overflow attack☆19Updated last year
- ☆9Updated 2 years ago
- CTF writeups maintained by TeamShakti members.☆27Updated last year
- ☆32Updated 2 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆147Updated 4 months ago
- I created this to dump challenge for CTF that I participated☆12Updated last year
- Official writeups for Hack The Boo CTF 2023☆44Updated 4 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- Craft engaging XSS challenges effortlessly with CTF-XSS-BOT. This template simplifies setting up an environment for Capture The Flag comp…☆38Updated last month
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Practice Labs☆89Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Challenges I wrote for various CTF competitions☆41Updated 9 months ago
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Updated last year
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆73Updated 2 years ago
- The First Open Source Bug Bounty Platform☆71Updated this week
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- All challenges from DiceCTF 2023☆72Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated last year
- Source code and solution of CTF challenges that I created.☆46Updated 10 months ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆25Updated this week
- Materials from different CTFs for later reuse☆25Updated 2 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- ☆45Updated 3 years ago