orangice's starred repositories
Windows-Internals
Advanced Exploit Mitigation Paper
CSC-748-Software-Exploitation-Spring-2020
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be covered.
AWE-OSEE-Prep
Advanced Windows Exploitation/Offensive Security Exploitation Expert (OSEE) Preparation for AWE 2020 @ BlackHat
Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
THC-Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
WindowsExploitationResources
Resources for Windows exploit development
taintgrind
A taint-tracking plugin for the Valgrind memory checking tool
exploit_generator
Automated Exploit generation with WinDBG
Enterprise_Security_Build--Open_Source
甲方企业安全建设开源之路
Security-misc
# Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS and so forath) and popular applicaiton
Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
firmware-analysis-toolkit
Toolkit to emulate firmware and analyse it for security vulnerabilities
owasp-fstm
The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers, consultants, and Information Security professionals with conducting firmware security assessments.
Deterministic_LFH
Have fun with the LowFragmentationHeap
ubi_reader
Collection of Python scripts for reading information about and extracting data from UBI and UBIFS images.