Binary Exploitation CTF
-
Updated
Feb 18, 2023 - C
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Binary Exploitation CTF
Linux source to patch Windows NT's sethc.exe to cmd.exe so that pressing SHIFT 5 times at the login screen opens a SYSTEM level cmd.exe
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
Fixed version of the Python script to exploit CVE-2018-19571 and CVE-2018-19585 (GitLab 11.4.7 - Authenticated Remote Code Execution) that is available at https://www.exploit-db.com/exploits/49263 (Python 3.9).
In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO’s workstation.
This project is intended to create a github version of search functions for exploits through Criminal IP.
To download this, turn off antivirus as google flags this as a false-positive
A automation script to bypass 403
An exploit for vm2 sandbox < 3.9.18
CWE-416 Use-After-Free Vulnerability, Attack and Fix
Onl working roblox executor, made in partnership with codex and arceus
Security of systems and internet services (labs)
Multi-Architecture GDB Enhanced Features for exploit devs & reversers
Created by The cybersecurity community