esoteric
☆58Sep 9, 2020Updated 5 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources to learn about Insecure Deserialization☆18Jul 12, 2024Updated last year
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- Udemy – Linux Heap Exploitation☆56Jun 14, 2021Updated 4 years ago
- The Ultimate Guide to Pwning☆60Apr 4, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some Ghidra scripts to automate my reverse-engineering tasks☆20Mar 18, 2021Updated 5 years ago
- ☆81Oct 15, 2017Updated 8 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 8 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Example files to experience basic exploit techniques.☆74Apr 29, 2019Updated 7 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- ☆12Apr 20, 2025Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆234Jun 22, 2023Updated 2 years ago
- ☆44Oct 20, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Demo of hooking NtCreateFile in Notepad on x64 Windows 10 using EasyHook library☆27Nov 20, 2017Updated 8 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- volatility☆21Nov 16, 2014Updated 11 years ago
- Code for the Selene language developed during Classpert's Building a Programming Language course☆10Jan 21, 2024Updated 2 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- A GUI frontend for LLDB.☆27Jul 22, 2021Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Scudo useful files☆10Jul 3, 2022Updated 3 years ago
- ☆22Jul 8, 2022Updated 3 years ago
- GraphQL automatic fuzzing tool☆16Jul 16, 2021Updated 4 years ago
- Collection of sources by RU VX'er Indy (Indy, Clerk)☆13Sep 4, 2015Updated 10 years ago
- Add an empty section to a PE file☆53Aug 8, 2017Updated 8 years ago
- Concolic Exection Engine for Golang☆10May 16, 2018Updated 7 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Software Exploitation☆11Sep 22, 2025Updated 7 months ago
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- Knowledge Base of Exploitation Techniques☆61Apr 30, 2025Updated last year
- ☆14Jun 26, 2013Updated 12 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- This repo contains mindmap and content regarding reflected xss.☆11Aug 11, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month