A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
☆12May 29, 2017Updated 8 years ago
Alternatives and similar repositories for awesome-exploit-development
Users that are interested in awesome-exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 7 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆18Jul 28, 2022Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- UIAN - the Unified Industrial Automation Namespace Project☆14Nov 13, 2024Updated last year
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- Option, Try, Either, and some more common basic DataTypes☆14Jul 1, 2023Updated 2 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated last month
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts for AWS amusement...☆21May 3, 2022Updated 3 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Mar 31, 2026Updated last week
- ☆11May 30, 2021Updated 4 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- CTF-Circle Resources for CTFs and other things☆15Dec 9, 2018Updated 7 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Jun 10, 2018Updated 7 years ago
- Monoid, Functor, Applicative, Monad and more☆18May 7, 2023Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- Nothing serious or finished, just playing with events, feeds, activities, timelines, wooooooooooo☆10Dec 6, 2018Updated 7 years ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆56Nov 30, 2020Updated 5 years ago
- Antenna analyzer based on RigExpert Zero II and Arduino☆13Jan 25, 2024Updated 2 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefil…☆18Mar 23, 2014Updated 12 years ago