xelenonz / gameLinks
ROP Wargame repository
☆26Updated 8 years ago
Alternatives and similar repositories for game
Users that are interested in game are comparing it to the libraries listed below
Sorting:
- ☆16Updated 8 years ago
- ☆14Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- ☆25Updated last month
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- ☆20Updated 6 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Updated 3 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆14Updated 6 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 10 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Updated 13 years ago
- ☆18Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆36Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆62Updated last year
- A repository for my conference presentations☆35Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago