Pinned Repositories
buffer-overflow.github.io
Build a Jekyll blog in minutes, without touching the command line.
CSC-748-Software-Exploitation-Spring-2020
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be covered.
HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
OSEE
OSEE Preparation
OSWE
OSWE Preparation
secDevLabs
A laboratory for learning secure web development in a practical manner.
Security_Engineer_Interview_Questions
Every Security Engineer Interview Question From Glassdoor.com
buffer-overflow's Repositories
buffer-overflow/buffer-overflow.github.io
Build a Jekyll blog in minutes, without touching the command line.
buffer-overflow/CSC-748-Software-Exploitation-Spring-2020
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be covered.
buffer-overflow/CTFs
buffer-overflow/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
buffer-overflow/OSEE
OSEE Preparation
buffer-overflow/OSWE
OSWE Preparation
buffer-overflow/secDevLabs
A laboratory for learning secure web development in a practical manner.
buffer-overflow/Security_Engineer_Interview_Questions
Every Security Engineer Interview Question From Glassdoor.com