☆62Oct 2, 2024Updated last year
Alternatives and similar repositories for exploit-development-roadmap
Users that are interested in exploit-development-roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21May 19, 2022Updated 3 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Oct 18, 2023Updated 2 years ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆15Jun 4, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PAM Backdoor☆32Mar 29, 2023Updated 3 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Malware Analysis Exercise Samples and Resources☆57Mar 17, 2026Updated 3 weeks ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 10 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 10 months ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆45Apr 27, 2024Updated last year
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- ☆14Feb 15, 2019Updated 7 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆39Sep 8, 2025Updated 7 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆119Oct 30, 2025Updated 5 months ago
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- A list of resources I collected during my journey into cybersecurity☆35Oct 9, 2021Updated 4 years ago
- Resources for Browser Security Research☆57Sep 17, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆14Sep 28, 2023Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Testing code for WebKit exploit in the Nintendo Switch☆10Mar 17, 2017Updated 9 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆37Dec 23, 2025Updated 3 months ago
- Programmers Editor that grows with you☆13Jan 16, 2025Updated last year
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆74Nov 12, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Escape macOS Sandbox using sharedfilelistd exploit☆63Jun 28, 2025Updated 9 months ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 4 months ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- ☆11Aug 3, 2022Updated 3 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 3 years ago