RE / Binary Exploitation Resources
☆73Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for pwning
Users that are interested in pwning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Sep 22, 2020Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Collection of writeups☆15Sep 26, 2021Updated 4 years ago
- A small repo to host b01lers' outline of what CTF is and how to get into it.☆33Apr 21, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Use a local instance of retdec to decompile functions in radare2☆22Dec 3, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆264Jul 4, 2023Updated 2 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Public repository of 2026 crackmes.one CTF RE challenge☆30Mar 10, 2026Updated 3 weeks ago
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 16, 2026Updated 2 weeks ago
- A gentle introduction to binary exploitation☆43May 9, 2020Updated 5 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- ☆16Mar 6, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆19Apr 15, 2019Updated 6 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆361Jan 4, 2024Updated 2 years ago
- The repo contains publicly available malware analysis and reversing resources.☆12Oct 13, 2025Updated 5 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆26Jul 19, 2024Updated last year
- ☆20Sep 2, 2021Updated 4 years ago