NimishMishra / exploit-devLinks
All about pwning, reversing, and the road to exploit development
☆18Updated 3 years ago
Alternatives and similar repositories for exploit-dev
Users that are interested in exploit-dev are comparing it to the libraries listed below
Sorting:
- Collection of browser challenges☆139Updated 4 years ago
- Udemy – Linux Heap Exploitation☆54Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆113Updated last year
- CTF pwn problem writeup☆40Updated 2 years ago
- Set of pre-generated pwn.college challenges☆68Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆60Updated 2 years ago
- Kernel development & exploitation practice environment.☆250Updated 2 years ago
- ☆103Updated last month
- A tool for automating setup of kernel pwn challenges☆62Updated 3 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆113Updated last week
- Old and new CTFs about Linux kernel exploitation.☆64Updated 3 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22Updated 3 years ago
- A full English version of the popular ctf-wiki☆109Updated last year
- ☆45Updated 5 months ago
- Source code and solution of CTF challenges that I created.☆45Updated 7 months ago
- ☆111Updated last year
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Updated 2 years ago
- A bunch of v8 resources (with a security focus)☆93Updated 3 weeks ago
- All challenges from DiceCTF 2023☆74Updated 3 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Updated 6 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆14Updated 9 months ago
- RE / Binary Exploitation Resources☆74Updated 8 years ago
- Collection of pwn techniques☆29Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 11 months ago
- A collection of web browser CTF challenges and solutions.☆32Updated 3 years ago
- FSOP Again☆32Updated 3 years ago
- angr tutorial for ctf☆163Updated 4 years ago
- ASLR bypass without infoleak☆167Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆198Updated last year