☆316Apr 8, 2022Updated 4 years ago
Alternatives and similar repositories for Exploit-Development
Users that are interested in Exploit-Development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kernel Exploits☆258Jul 18, 2021Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆40Apr 17, 2020Updated 6 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,562Jan 13, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Oct 3, 2021Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆211Jul 2, 2020Updated 5 years ago
- OSEE Preparation☆192Feb 15, 2019Updated 7 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆144Aug 4, 2021Updated 4 years ago
- ☆30Sep 5, 2025Updated 8 months ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆223May 15, 2020Updated 6 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- ☆47Jun 30, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Dump of win32k POCs for bugs I've found☆378Mar 6, 2022Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Jun 22, 2023Updated 2 years ago
- CVE-2020-15368, aka "How to exploit a vulnerable driver"☆511Apr 14, 2022Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆313Sep 9, 2020Updated 5 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆609Jul 15, 2024Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆198Jul 27, 2022Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,490Sep 4, 2024Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆921May 20, 2024Updated 2 years ago
- ☆199Feb 14, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Examples of leaking Kernel Mode information from User Mode on Windows☆639Jul 7, 2017Updated 8 years ago
- ☆430Nov 28, 2020Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆103Jul 30, 2019Updated 6 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆261Sep 1, 2022Updated 3 years ago
- collect for learning cases☆595Apr 12, 2026Updated last month
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- ☆91Oct 17, 2020Updated 5 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆747Nov 1, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆50Jun 8, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆813Aug 18, 2024Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated 2 months ago