There are 24 repositories under exploit-exercises topic.
Collection of things made during my preparation to take on OSCE
Exploiting challenges in Linux and Windows
Collection of things made during my preparation to take on OSEE
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Example files to experience basic exploit techniques.
Challenges and vulnerabilities exploitation.
Exploitation on different architectures (x86, x64, arm, mips, avr)
My collection of self-written exploits
Metasploit Modules from Mastering Metasploit Book
Repository of challenges for SunshineCTF 2019
Introductory presentation on stack-based buffer overflows
Damn Vulnerable Tiny Web Server - A deliberately insecure webserver for learning purpose
Protostar exploit python scripts
python scripts that have served utility
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
protostar exercises solved using pwntools
xss vulnerable chat used to learn how to perform and protect against xss attacks
lame exploits developed for protostar
Development with C# WinForm. Just for study and programming excercises.
🐉 Experience a detailed showcase of exploit discovery, analysis, reproduction, and documentation of five XSS vulnerabilities impacting an outdated WordPress version. 🔍💻📄
Projet final de la technique informatique de gestion au Cegep du Vieux montréal. Le but était de créer un ver informatique avec des fonctionnalités de controle à distance et d'exfiltration de données.
Applying known exploits (based on CVE db info) to a phpBB deploy, for fun!
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Cyber Security Projects - Donovan Conrad
Notes and exploits
This is a solution set the problems found at exploit education
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Solutions for the VMs on exploit-exercises.com
La documentación de mi proyecto de síntesis realizado en el grado medio de formación profesional "SMR", presentado el mayo del 2023. GitHub es para backups, para leer en formato correcto usa GitBook, link debajo.
The semester projects of The Attack and Defense of Computers at NCU, Taiwan
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution