A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
☆12May 29, 2017Updated 8 years ago
Alternatives and similar repositories for awesome-exploit-development
Users that are interested in awesome-exploit-development are comparing it to the libraries listed below
Sorting:
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆18Jul 28, 2022Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 2 months ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- UIAN - the Unified Industrial Automation Namespace Project☆14Nov 13, 2024Updated last year
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- Option, Try, Either, and some more common basic DataTypes☆14Jul 1, 2023Updated 2 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated 2 weeks ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Scripts for AWS amusement...☆21May 3, 2022Updated 3 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Jun 7, 2025Updated 9 months ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- ☆11May 30, 2021Updated 4 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- CTF-Circle Resources for CTFs and other things☆15Dec 9, 2018Updated 7 years ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆35Apr 15, 2023Updated 2 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Jun 10, 2018Updated 7 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Embed Tweets without compromising your users’ privacy and your site’s performance.☆14Mar 19, 2024Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- Nothing serious or finished, just playing with events, feeds, activities, timelines, wooooooooooo☆10Dec 6, 2018Updated 7 years ago