Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for stack exploitation
exploitation
x
stack
x
7 search results found
Chimay Red
⭐
613
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
Hacksysteam Pskernelpwn
⭐
128
Research
⭐
122
the core papers i researched about kernel security.
Windows Exploitation
⭐
84
My notes while studying Windows exploitation
Osce
⭐
62
Public Exploits + Extra-curriculum for OSCE Exam Preparation
Router Exploit Shovel
⭐
52
Automated Application Generation for Stack Overflow Types on Wireless Routers
Winpwn
⭐
49
Windows Pwnable Study
Stackjacking
⭐
42
PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"
Nginxpwn
⭐
41
Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow
Hevd_kernel_exploit
⭐
36
Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Cyberqueens
⭐
29
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Dc2019f Aoool Public
⭐
16
Kernel Exploitation
⭐
15
Modern Kernel Stack Buffer Exploitation (4.3.5). Few code snippets and my BlueBorne exploitation experience.
Hsevd Stackcookiebypass
⭐
14
HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit
Buffer Overflow Exploit
⭐
11
Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.
Si485h F18
⭐
8
SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version
Zenysec Exploit Exercises
⭐
7
Exploit Exercises for Security Researchers (arm, x86...)
Cfi
⭐
7
Toy binaries to play with -fsanitize=safe-stack/cfi
Ctf_htb Writeups Scripts
⭐
7
All my blogs for ExpDev, HTB, BinaryExploit, Etc.
Mips_exploit
⭐
7
Belkin F9k1122v1 Exploit
⭐
6
Metasploit Module of the Belkin F9K1122v1 Stack-Based Buffer Overflow Exploit with Process Continuation
Buffer Overflow
⭐
6
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Rop On Arm Rpi3 Tutorial
⭐
5
ARM (A32) Linux Return-oriented Programming with Raspberry Pi
Related Searches
Javascript Stack (3,891)
Python Stack (1,696)
Python Exploitation (1,616)
Docker Stack (1,322)
Amazon Web Services Stack (1,060)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Exploitation Penetration Testing (353)
1-7 of 7 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.