☆317Apr 8, 2022Updated 4 years ago
Alternatives and similar repositories for Exploit-Development
Users that are interested in Exploit-Development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kernel Exploits☆259Jul 18, 2021Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,556Jan 13, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Oct 3, 2021Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- OSEE Preparation☆191Feb 15, 2019Updated 7 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Aug 4, 2021Updated 4 years ago
- ☆30Sep 5, 2025Updated 7 months ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆225May 15, 2020Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆446Apr 11, 2025Updated 11 months ago
- CVE-2020-15368, aka "How to exploit a vulnerable driver"☆507Apr 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆48Jun 30, 2020Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Jun 22, 2023Updated 2 years ago
- Dump of win32k POCs for bugs I've found☆380Mar 6, 2022Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆308Sep 9, 2020Updated 5 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆605Jul 15, 2024Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆200Jul 27, 2022Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- ☆198Feb 14, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago
- ☆431Nov 28, 2020Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- collect for learning cases☆594Jun 16, 2024Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- ☆90Oct 17, 2020Updated 5 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆745Nov 1, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆49Jun 8, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆802Aug 18, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,170Sep 29, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated 3 weeks ago