☆58Oct 2, 2024Updated last year
Alternatives and similar repositories for exploit-development-roadmap
Users that are interested in exploit-development-roadmap are comparing it to the libraries listed below
Sorting:
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Front de la pagina Machete Exactas para subir resueltos y demas de las materias de FCEN UBA☆12Sep 24, 2024Updated last year
- ☆10Jan 9, 2026Updated last month
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- ☆14May 14, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆44Apr 27, 2024Updated last year
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 9 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 7 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- ☆11Aug 18, 2023Updated 2 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 11 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆47Jan 21, 2026Updated last month
- ☆10Aug 28, 2020Updated 5 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Malware Analysis Exercise Samples and Resources☆57Feb 21, 2026Updated last week
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Jun 17, 2022Updated 3 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- nacos 任意文件读写☆11Aug 29, 2024Updated last year
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆19Mar 22, 2025Updated 11 months ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆19Nov 10, 2024Updated last year