Challenges and vulnerabilities exploitation.
☆60Dec 26, 2020Updated 5 years ago
Alternatives and similar repositories for exploits_challenges
Users that are interested in exploits_challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- Crackmes Keygenmes Serialmes y más☆43Sep 11, 2022Updated 3 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- Mobile Pentesting Guide (WIP)☆26May 13, 2020Updated 5 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Hackthebox weekly boxes writeups.☆14Sep 16, 2023Updated 2 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Mar 7, 2025Updated last year
- ☆13Oct 10, 2018Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- ELF patcher implemented in pure Ruby!☆28Nov 28, 2025Updated 3 months ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- Complete examples of solidity exploits☆13Oct 17, 2017Updated 8 years ago
- Small Rust programs that do weird things☆30Feb 13, 2026Updated last month
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Reversing list☆149Jan 9, 2024Updated 2 years ago
- ☆30Nov 25, 2025Updated 4 months ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- A gentle introduction to binary exploitation☆42May 9, 2020Updated 5 years ago