☆59Oct 2, 2024Updated last year
Alternatives and similar repositories for exploit-development-roadmap
Users that are interested in exploit-development-roadmap are comparing it to the libraries listed below
Sorting:
- ☆21May 19, 2022Updated 3 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Oct 18, 2023Updated 2 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Pure Malware Development Resource Collections☆434Dec 29, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ☆10Jan 9, 2026Updated 2 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Updated this week
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago
- ☆18Jul 5, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- ☆44Apr 27, 2024Updated last year
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆100Jun 18, 2020Updated 5 years ago
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆56Jun 15, 2025Updated 9 months ago
- Resources for Browser Security Research☆54Sep 17, 2022Updated 3 years ago
- Documentation for the 35c3 junior capture the flag event☆10Jan 2, 2019Updated 7 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- Testing code for WebKit exploit in the Nintendo Switch☆10Mar 17, 2017Updated 9 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆36Dec 23, 2025Updated 2 months ago
- Programmers Editor that grows with you☆13Jan 16, 2025Updated last year
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- A useful IDA Notepad plug-in that can completely replace IDA’s native Notepad window.☆33Dec 3, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- Some papers and exploit writeups about WebKit.☆20Feb 18, 2024Updated 2 years ago
- ☆11Aug 3, 2022Updated 3 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Resources for console exploitation, psp, ds, ps vita etc.☆10May 30, 2018Updated 7 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago