My own custom payloads for the USB Rubber Ducky made by Hak5
-
Updated
Jul 5, 2023 - PowerShell
My own custom payloads for the USB Rubber Ducky made by Hak5
Writeup for my solutions to the challenges on ropemporium.com
Vulnerability research, firmware analysis, reverse engineering, programming notes (as much as I can)
A handy WinDBG script for finding PPR instructions
Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application.
Solutions of some CTFs I've solved, if they are worth publishing.
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
This is an environment for linux kernel exploitation.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
An open-source x64/x32 debugger for windows.
My solutions to the Protostar binary exploitation exercises.
The purpose of this program is to help beginner and intermediate users to hone their web exploitation and development skills by mirroring a vunerable e-commerce application.
This is a elborate CTF that involves WordPress explotations and uploading PHP Shell Scripts to gain access to the server!
Materials, notes, and talks about binary exploitation & RE
Simple Script which can be used to brute force to get results from Babu Banarasi Das University website.
A WIP game focused on hacking
My solutions to ropemporium challenges
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."