URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
Oct 4, 2024 - C#
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
La documentación de mi proyecto de síntesis realizado en el grado medio de formación profesional "SMR", presentado el mayo del 2023. GitHub es para backups, para leer en formato correcto usa GitBook, link debajo.
Solutions of some CTFs I've solved, if they are worth publishing.
The semester projects of The Attack and Defense of Computers at NCU, Taiwan
Damn Vulnerable Tiny Web Server - A deliberately insecure webserver for learning purpose
Projet final de la technique informatique de gestion au Cegep du Vieux montréal. Le but était de créer un ver informatique avec des fonctionnalités de controle à distance et d'exfiltration de données.
My collection of self-written exploits
Collection of things made during my preparation to take on OSCE
Pwntools Blog
Cyber Security Projects - Donovan Conrad
This is a solution set the problems found at exploit education
Challenges and vulnerabilities exploitation.
Notes and exploits
Exploitable VM for learning about buffer overflow attacks
Introductory presentation on stack-based buffer overflows
Add a description, image, and links to the exploit-exercises topic page so that developers can more easily learn about it.
To associate your repository with the exploit-exercises topic, visit your repo's landing page and select "manage topics."