esoteric
☆57Sep 9, 2020Updated 5 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources to learn about Insecure Deserialization☆18Jul 12, 2024Updated last year
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Mar 29, 2026Updated 2 weeks ago
- Udemy – Linux Heap Exploitation☆56Jun 14, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Ultimate Guide to Pwning☆60Apr 4, 2018Updated 8 years ago
- In Soviet Russia, Mithril forges ELF.☆28Jan 23, 2018Updated 8 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆20Mar 18, 2021Updated 5 years ago
- ☆81Oct 15, 2017Updated 8 years ago
- ☆21Sep 12, 2025Updated 7 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Jun 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- External Playbooks for Public Access☆41Jan 31, 2025Updated last year
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆22Jul 8, 2022Updated 3 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- ☆41Jul 20, 2020Updated 5 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- GraphQL automatic fuzzing tool☆16Jul 16, 2021Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- An OCaml implementation of the DPLL algorithm for solving SAT instances. Uses nothing beyond the OCaml List library.☆19Sep 5, 2014Updated 11 years ago
- How to get started with a cyber threat intelligence program☆16Mar 5, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Add an empty section to a PE file☆53Aug 8, 2017Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- Software Exploitation☆11Sep 22, 2025Updated 6 months ago
- Knowledge Base of Exploitation Techniques☆61Apr 30, 2025Updated 11 months ago
- ☆14Jun 26, 2013Updated 12 years ago
- SVM Abstrac Verifier tool☆12Oct 13, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month