NimishMishra / exploit-devLinks
All about pwning, reversing, and the road to exploit development
☆18Updated 2 years ago
Alternatives and similar repositories for exploit-dev
Users that are interested in exploit-dev are comparing it to the libraries listed below
Sorting:
- CTFs and solutions for Linux binary exploitation.☆110Updated last year
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Collection of browser challenges☆137Updated 4 years ago
- Udemy – Linux Heap Exploitation☆43Updated 4 years ago
- Kernel development & exploitation practice environment.☆233Updated last year
- A full English version of the popular ctf-wiki☆97Updated last year
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- ☆14Updated 5 years ago
- Writeups for CTFs☆73Updated 3 weeks ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆43Updated 2 years ago
- auto-ropper☆17Updated 3 years ago
- ☆100Updated last year
- Source code and solution of CTF challenges that I created.☆46Updated 3 weeks ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆30Updated 5 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆118Updated last year
- Resources to getting started vulnerability research on IoT/embedded devices.☆67Updated 3 weeks ago
- A tool for automating setup of kernel pwn challenges☆59Updated last month
- ☆45Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆81Updated 5 months ago
- Write-ups for various CTF☆192Updated last year
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- Collection of pwn techniques☆29Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆107Updated 3 years ago
- CTF write-ups☆86Updated 7 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- reverse engninering & pwn writeup☆24Updated 4 years ago
- ☆110Updated 8 months ago
- ☆21Updated last week
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago