Exploitation on different architectures (x86, x64, arm, mips, avr)
☆38Oct 23, 2018Updated 7 years ago
Alternatives and similar repositories for exploitrainings
Users that are interested in exploitrainings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Arm Episodes☆78Jan 25, 2018Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Tools for analyzing hexagon code☆39Jun 22, 2016Updated 9 years ago
- A modified android 8.1 for reverse engineer...☆11May 16, 2020Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- ☆15Updated this week
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Python Script Obfuscator☆10Nov 20, 2014Updated 11 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆940Nov 15, 2021Updated 4 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago
- Getting windows operating system version information by 3 ways. using APIs,GetVersionEx, VerifyVersionInfo☆13Apr 9, 2015Updated 10 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Personal vim configuration files including setup file.☆15Sep 3, 2024Updated last year
- ☆19Apr 30, 2018Updated 7 years ago
- Mobile security trainings based on android☆106Nov 12, 2020Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- 针对iOS应用程序的漏洞检测☆11Dec 4, 2018Updated 7 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- ☆19Jul 20, 2015Updated 10 years ago