esoteric
☆57Sep 9, 2020Updated 5 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Resources to learn about Insecure Deserialization☆17Jul 12, 2024Updated last year
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Feb 26, 2026Updated 3 weeks ago
- Udemy – Linux Heap Exploitation☆55Jun 14, 2021Updated 4 years ago
- The Ultimate Guide to Pwning☆59Apr 4, 2018Updated 7 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 5 years ago
- ☆81Oct 15, 2017Updated 8 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Mar 5, 2012Updated 14 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- ☆12Apr 20, 2025Updated 11 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Jun 22, 2023Updated 2 years ago
- ☆44Oct 20, 2017Updated 8 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- External Playbooks for Public Access☆41Jan 31, 2025Updated last year
- volatility☆21Nov 16, 2014Updated 11 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- A GUI frontend for LLDB.☆27Jul 22, 2021Updated 4 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- Scudo useful files☆10Jul 3, 2022Updated 3 years ago
- ☆22Jul 8, 2022Updated 3 years ago
- This is a framework for web penetration testers and web developers☆12Apr 15, 2023Updated 2 years ago
- ☆41Jul 20, 2020Updated 5 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- An OCaml implementation of the DPLL algorithm for solving SAT instances. Uses nothing beyond the OCaml List library.☆19Sep 5, 2014Updated 11 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Add an empty section to a PE file☆53Aug 8, 2017Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Software Exploitation☆11Sep 22, 2025Updated 6 months ago
- Knowledge Base of Exploitation Techniques☆60Apr 30, 2025Updated 10 months ago