Modern Binary Exploitation - CSCI 4968 is an educational repository containing course materials developed by RPISEC for teaching binary exploitation at Rensselaer Polytechnic Institute. The repository includes comprehensive materials covering vulnerability research, reverse engineering, and binary exploitation techniques. The course content is structured to provide students with practical offensive security skills through hands-on learning approaches. The materials encompass various aspects of binary security including exploitation methodologies, vulnerability analysis, and reverse engineering practices. The repository serves as a complete educational resource with syllabus information and detailed course content. Students and security professionals can access structured learning materials that cover modern binary exploitation techniques and vulnerability research methodologies. The content is designed for academic instruction in offensive security practices.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
A digital archive of the internet, allowing users to capture and browse archived web pages.
SharpEDRChecker scans system components to detect security products and tools.
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
PyBOF is a Python library that enables in-memory loading and execution of Beacon Object Files (BOFs) with support for argument passing and function targeting.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.