Binary Exploitation CTF
-
Updated
Feb 18, 2023 - C
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Binary Exploitation CTF
VirIT Explorer v.8.1.68 Local Privilege Escalation (System)/Arbitrary Code Execution
Exploiting the vulnerabilities
VerSprite Security Research
PoC code for CVE-2018-16713 (exploit by rdmsr)
Exploit script to constantly get free access to O'Reilly Learning material via their Free Trial Page - https://learning.oreilly.com/register/
Some Shell Scripts for System Exploitation
Easy to read Python script for exploiting Samba versions 3.0.20 through 3.0.25rc3
This is a standalone exploit for a vulnerable feature in Capcom.sys
PoC Exploits organized by CVE identifier in easily parsable JSON format
x86-x64 arch windows shellcodes.
Linux script to parse the raw bytes from objdump into shellcode.
This script was written for the 'Intro PoC Scripting' room on TryHackMe.com
Zutto Dekiru encoder in HatSploit
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
Created by The cybersecurity community