Binary Exploitation CTF
-
Updated
Feb 18, 2023 - C
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Binary Exploitation CTF
Linux source to patch Windows NT's sethc.exe to cmd.exe so that pressing SHIFT 5 times at the login screen opens a SYSTEM level cmd.exe
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
CWE-416 Use-After-Free Vulnerability, Attack and Fix
Fork of saneki repository which is a port of Kao's delphi tool in C.
42 | Privilege escalation exercices on a system image
This is a repository with exploits for ToaruOS.
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
PoC code for CVE-2018-16711 (exploit by wrmsr)
Example of CVE-2022-46689 aka MacDirtyCow.
An example of basic virus writing in C
Created by The cybersecurity community