Work files for my blog post "Code Caving in a PE file.
-
Updated
Dec 18, 2016
Work files for my blog post "Code Caving in a PE file.
Good to know, easy to forget information about binaries and their exploitation!
An in depth tutorial on how to do binary exploitation
Writeups for Junior InCTF 2017
ROPChain generator.
Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.
Python script to carve shellcode into the EAX register
Simple and extensible fuzzer
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
The Perfect Hack! - IEEE NITK Edify Workshop
This is the place where we will put all the experiments we do to build the ROP-Compiler
Repository of challenges for SunshineCTF 2019
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
generate x86 shellcode from a simple scripting language
[WIP] some MIPS exploitation challenges, covering stack and heap based overflows
This is a tool for creating a basic skeleton for binary exploitation
Add a description, image, and links to the binary-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the binary-exploitation topic, visit your repo's landing page and select "manage topics."