My own custom payloads for the USB Rubber Ducky made by Hak5
-
Updated
Jul 5, 2023 - PowerShell
My own custom payloads for the USB Rubber Ducky made by Hak5
Writeup for my solutions to the challenges on ropemporium.com
An open-source x64/x32 debugger for windows.
My solutions to the Protostar binary exploitation exercises.
The purpose of this program is to help beginner and intermediate users to hone their web exploitation and development skills by mirroring a vunerable e-commerce application.
This is a elborate CTF that involves WordPress explotations and uploading PHP Shell Scripts to gain access to the server!
Vulnerability research, firmware analysis, reverse engineering, programming notes (as much as I can)
A handy WinDBG script for finding PPR instructions
Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application.
A PoC exploit for CVE-2014-6271 - Shellshock
Neat little pip workaround for install rights limited systems, just replace pyodbc with whatever packages you want as long as it's after pip install --upgrade pip
React application which consume Decathlon Sports API 🚀
Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!
Exploitation is the third stage of Penetration Testing, it means attacking the vulerabilities discovered in the previous steps in order to gain access to the target.
A collection of my Cyber Security based Python projects for.
Materials, notes, and talks about binary exploitation & RE
Simple Script which can be used to brute force to get results from Babu Banarasi Das University website.
A WIP game focused on hacking
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."