Binary Exploitation CTF
-
Updated
Feb 18, 2023 - C
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Binary Exploitation CTF
VerSprite Security Research
Proof of concept code in python3 of the slowloris HTTP exploit
Some Shell Scripts for System Exploitation
x86-x64 arch windows shellcodes.
This script was written for the 'Intro PoC Scripting' room on TryHackMe.com
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
Proof of concept (PoC) - misc PoC - Internet of (In)Security Things
D-Language based MMS plugin and server for exploiting vulnerable servers.
Bot that automates trading and clicker activities in Dogs House game. Includes crypto exchange integration and Telegram support for management. Features hacks and cheats to enhance trading efficiency and maximize profits.
"Windows-Python-Pickle-Deserialization-Exploit" demonstrates exploiting deserialization vulnerabilities in Python applications on Windows.
Permite realizar bypass (eludir) el mecanismo de protección de fuerza bruta de Bludit CMS versión 3.9.2 o inferior, mediante el uso de diferentes encabezados HTTP X-Forwarded-For falsificados.
Proof of Concept of RouterOS v6.42 Critical Vulnerability (CVE-2018-14847)
Serverside Template Injection (SSTI) RCE - THM challenge "whiterose"
Created by The cybersecurity community