A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
☆12May 29, 2017Updated 8 years ago
Alternatives and similar repositories for awesome-exploit-development
Users that are interested in awesome-exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A curated list of awesome threat detection and hunting resources☆19Apr 13, 2019Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A curated list of Awesome Threat Intelligence resources☆18Mar 27, 2019Updated 7 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆19Jul 28, 2022Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 4 months ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- UIAN - the Unified Industrial Automation Namespace Project☆14Nov 13, 2024Updated last year
- Option, Try, Either, and some more common basic DataTypes☆14Jul 1, 2023Updated 2 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated 2 months ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts for AWS amusement...☆21May 3, 2022Updated 4 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Apr 30, 2026Updated 3 weeks ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- CTF-Circle Resources for CTFs and other things☆15Dec 9, 2018Updated 7 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Jun 10, 2018Updated 7 years ago
- Embed Tweets without compromising your users’ privacy and your site’s performance.☆14Mar 19, 2024Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Feb 19, 2018Updated 8 years ago
- Nothing serious or finished, just playing with events, feeds, activities, timelines, wooooooooooo☆10Dec 6, 2018Updated 7 years ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆56Nov 30, 2020Updated 5 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 4 years ago
- Antenna analyzer based on RigExpert Zero II and Arduino☆13Jan 25, 2024Updated 2 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago