Pentest, CTF - TrailOfBits CTF Field Guide
-
Updated
Mar 2, 2016 - C
Pentest, CTF - TrailOfBits CTF Field Guide
Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
Course materials for Modern Binary Exploitation by RPISEC
NTPD remote DOS exploit and vulnerable container
Cool exploitation assignments!
Materials, notes, and talks about binary exploitation & RE
A modular pentesting framework implemented in C
Security Evaluation of Dynamic Binary Instrumentation Engines
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
Statically compiled binaries of Protostar (exploit-exercises.com) in ARM and MIPS along with original source code
[WIP] some MIPS exploitation challenges, covering stack and heap based overflows
Kernel exploits for the Oculus Quest
Exploit randomness to beat vulnerable Blackjack. 利用随机漏洞完胜庄家21点。
A windows kernel driver to Block symbolic link exploit used for privilege escalation.
A game I researched, got arbitrary code execution on the game server.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."