Exploit development challenges!
☆24Mar 19, 2023Updated 3 years ago
Alternatives and similar repositories for exploit-me
Users that are interested in exploit-me are comparing it to the libraries listed below
Sorting:
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- As the name maProc informs, it will map processes in linux, being able to check a process's stack/heap in User Land, being able to change…☆27Aug 2, 2023Updated 2 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Map and modify ELF using C++ structures☆19Feb 28, 2021Updated 5 years ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- A PlayStation 5 ELF injector☆28Dec 15, 2025Updated 3 months ago
- Discover which process execute a hunted binary inside macOS☆27Dec 15, 2021Updated 4 years ago
- Uninterruptedly send mouse clicks on Windows☆21Jul 1, 2025Updated 8 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Sep 23, 2022Updated 3 years ago
- A set of functions to increase productivity while hacking with Bash☆207Feb 27, 2026Updated 3 weeks ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- Learning assembly x86 programming and reverse engineering☆15Dec 23, 2020Updated 5 years ago
- Vimana is a modular security framework for auditing Python APIs and Web applications. The plugin-based architecture enables security prof…☆65Jan 14, 2026Updated 2 months ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆16Mar 23, 2023Updated 2 years ago
- Free eBooks related to Ethical Hacking and Security☆11Jan 14, 2019Updated 7 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- Rust crate for r2pipe☆46Mar 9, 2026Updated last week
- Convert kindle and other ebooks to png and pdf file by taking screenshots and merging it into a pdf.☆13Mar 2, 2022Updated 4 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A C & x86 version of the "Let's Build a Compiler" by Jack Crenshaw☆10Nov 30, 2018Updated 7 years ago
- This is a database of sample c++ functions that can be run from Unity C# script.☆12Jan 21, 2019Updated 7 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated last month
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆37Sep 8, 2025Updated 6 months ago
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- ☆13Nov 21, 2025Updated 4 months ago
- A simple, fast, deeply embeddable memory management system (malloc, free). Fast, light. < 1K byte heaps possible.☆11Dec 12, 2017Updated 8 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆14Feb 4, 2025Updated last year
- Lua bindings for the Unicorn CPU emulation engine☆18Jan 31, 2026Updated last month