dobin / Yookiterm Slides
Exploitation and Mitigation Slides
Stars: ✭ 74
Projects that are alternatives of or similar to Yookiterm Slides
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+635.14%)
Mutual labels: exploit, exploitation
Cve 2019 11708
Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+685.14%)
Mutual labels: exploit, exploitation
Androrat
AndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+359.46%)
Mutual labels: exploit, exploitation
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-74.32%)
Mutual labels: exploit, exploitation
Featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1083.78%)
Mutual labels: exploit, exploitation
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-60.81%)
Mutual labels: exploit, exploitation
Heap Viewer
An IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+675.68%)
Mutual labels: exploit, exploitation
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1112.16%)
Mutual labels: exploit, exploitation
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+979.73%)
Mutual labels: exploit, exploitation
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (+64.86%)
Mutual labels: exploit, exploitation
nocom-explanation
block game military grade radar
Stars: ✭ 544 (+635.14%)
Mutual labels: exploit, exploitation
SubRosa
Basic tool to automate backdooring PE files
Stars: ✭ 48 (-35.14%)
Mutual labels: exploit, exploitation
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+89.19%)
Mutual labels: exploit, exploitation
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+71.62%)
Mutual labels: exploit, exploitation
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+729.73%)
Mutual labels: exploit, exploitation
Pysploit
Remote exploitation framework written in Python
Stars: ✭ 37 (-50%)
Mutual labels: exploit, exploitation
yookiterm-slides
Slides for BFH Exploiting & Defense course.
It includes slides for 7x4h content (seven days).
Content:
- PC / CPU basics
- Process memory layout
- C Arrays and other data structures
- Assembler Intro
- Shellcode
- Function Call Convention
- Debugging
- Buffer Overflows
- Exploit creation (summary of all above)
- Remote Exploit
- Exploit Mitigations (ASLR, DEP, Stack Canary)
- ROP Intro
- Heap Intro
- Heap Exploiting
- Windows Exploiting
- Secure Coding
- Fuzzing basics
- Linux Hardening
- Kernel Exploitation basics
- Hardware Hacking
Links / Resources
See Resources
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].