All about pwning, reversing, and the road to exploit development
☆18Aug 21, 2022Updated 3 years ago
Alternatives and similar repositories for exploit-dev
Users that are interested in exploit-dev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- 一本用代码写出来的Fuzzing书籍:The Fuzzing Book☆13Sep 30, 2023Updated 2 years ago
- General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.☆28Mar 17, 2021Updated 5 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- 抖音9.1.1,其他版本没试,device_register接口fiddler抓包密文的部分为显示明文,hook XG☆18Jul 3, 2020Updated 5 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆17Aug 25, 2023Updated 2 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Nov 4, 2018Updated 7 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 6 months ago
- Public repository of 2026 crackmes.one CTF RE challenge☆28Mar 10, 2026Updated 2 weeks ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- The Official Repository for BanditHijo (R)-Chive v1☆13Jan 14, 2026Updated 2 months ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- Crackme collections☆14May 24, 2020Updated 5 years ago
- My backup neovim config☆13Feb 14, 2026Updated last month
- Write-Ups for HackTheBox☆117May 21, 2023Updated 2 years ago
- ☆18Aug 15, 2025Updated 7 months ago
- ☆10Aug 6, 2019Updated 6 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- ☆11May 25, 2023Updated 2 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Jan 27, 2019Updated 7 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆56Mar 23, 2021Updated 5 years ago