Borrowed Instructions Synthetic Computation
-
Updated
Feb 20, 2015 - Ruby
Borrowed Instructions Synthetic Computation
Format string exploitation helper
Pentest, CTF - TrailOfBits CTF Field Guide
Find exploitable PHP files by parameter fuzzing and function call tracing
WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections
dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Advanced Web Browser Fingerprinting
Launch a Windows EXE file with this EXE file (application filter evasion)
Advanced Web Browser Fingerprinting
Open-source Exploiting Framework
Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
Simple Script which can be used to brute force to get results from Babu Banarasi Das University website.
Course materials for Modern Binary Exploitation by RPISEC
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."