Source files and summarized reports for some of the chapters and examples in the book.
☆21Aug 15, 2017Updated 8 years ago
Alternatives and similar repositories for hacking-art-of-exploitation
Users that are interested in hacking-art-of-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- Metamorphic Code Generator & Loader☆15Dec 7, 2020Updated 5 years ago
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Dec 10, 2021Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- ☆13Dec 1, 2020Updated 5 years ago
- GDB plug-in based on PWNDBG, GEF and PEDA that makes debugging MIPS with GDB suck less☆16Sep 18, 2024Updated last year
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Simulation of my relay computer using angular☆11May 9, 2026Updated last week
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- ☆11Jun 11, 2025Updated 11 months ago
- Web CTF CheatSheet 🐈☆33Apr 10, 2019Updated 7 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Jul 26, 2020Updated 5 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server☆12Jun 19, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fingerprint a web app using local files as the fingerprint sources☆39May 16, 2017Updated 9 years ago
- Patch for the emulation of Octeon MIPS64 in QEMU☆15Feb 2, 2018Updated 8 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- Hacking challenges☆17Oct 17, 2019Updated 6 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 6 years ago
- Demo of LoadLibrary function with C++ in Win32 API☆11Jul 12, 2023Updated 2 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 6 months ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Qt调用大漠插件☆10Oct 5, 2016Updated 9 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆29Apr 18, 2024Updated 2 years ago