esoteric
☆56Sep 9, 2020Updated 5 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below
Sorting:
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- ☆21Sep 12, 2025Updated 5 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Udemy – Linux Heap Exploitation☆54Jun 14, 2021Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Add an empty section to a PE file☆53Aug 8, 2017Updated 8 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆31Oct 10, 2022Updated 3 years ago
- The Ultimate Guide to Pwning☆59Apr 4, 2018Updated 7 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- External Playbooks for Public Access☆41Jan 31, 2025Updated last year
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Resources for learning about Exploit Development☆427Oct 1, 2020Updated 5 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Aug 1, 2022Updated 3 years ago
- ☆41Jul 20, 2020Updated 5 years ago
- Bitcoin (BTC) Private key checker from 1M btc address with valid balance.☆38May 15, 2025Updated 9 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- ☆11May 17, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Dec 1, 2017Updated 8 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Easily patch ASR on 64-bit devices.☆10Jul 31, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year