Source code from Hacking: The Art of Exploitation (Second Edition).
β457Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hacker, ready for more of our story ! πβ586May 20, 2023Updated 2 years ago
- Source files and summarized reports for some of the chapters and examples in the book.β20Aug 15, 2017Updated 8 years ago
- Notes to the bookβ20Oct 29, 2015Updated 10 years ago
- A curated list of awesome Hacking tutorials, tools and resourcesβ16,141Jun 2, 2024Updated last year
- Ha3Mrx Pentesting and Security Hackingβ440Nov 15, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Free Security and Hacking eBooksβ4,842Jul 10, 2019Updated 6 years ago
- Please refer to The Treasure Trove repo below and read the guidelines before accessing this databaseβ83Jul 11, 2015Updated 10 years ago
- A copy of articles published at Peerlystβ43Oct 30, 2016Updated 9 years ago
- RFID spoofing code from scanlime.orgβ20Sep 12, 2012Updated 13 years ago
- Awesome hacking is an awesome collection of hacking tools.β3,808Apr 2, 2026Updated 2 weeks ago
- A list of web application securityβ6,819Apr 10, 2026Updated last week
- WikiLeaks Vault 7 CIA Hacking Toolsβ206Aug 15, 2023Updated 2 years ago
- A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.β557Feb 11, 2021Updated 5 years ago
- RSYaba Modular Brute Force Attackerβ19Jun 2, 2014Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Data Hacking Projectβ785Mar 5, 2019Updated 7 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Ericksonβ22Mar 24, 2020Updated 6 years ago
- A collection of hacking / penetration testing resources to make you better!β16,941Mar 12, 2024Updated 2 years ago
- This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.β21Apr 23, 2018Updated 7 years ago
- Top 100 Hacking & Security E-Books (Free Download)β6,301Jul 26, 2024Updated last year
- Public Advisories for Security Vulnerabilities.β25Mar 14, 2015Updated 11 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-basedβ¦β49May 3, 2017Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloadsβ16Mar 16, 2017Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016β23Sep 23, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Course materials for Modern Binary Exploitation by RPISECβ5,964Dec 9, 2021Updated 4 years ago
- Exhaustive list of hacking toolsβ322May 15, 2020Updated 5 years ago
- Study CTF, study securityβ88Jul 16, 2019Updated 6 years ago
- collection of articles/books about programingβ589Dec 20, 2023Updated 2 years ago
- Tutorials, tools, and more as related to reverse engineering video games.β5,433Jun 20, 2024Updated last year
- ARP Exploitation in Pythonβ10Feb 19, 2017Updated 9 years ago
- CTF framework and exploit development libraryβ13,360Apr 7, 2026Updated last week
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Courseβ6,049Feb 12, 2023Updated 3 years ago
- Single stop for security related stuffβ58Nov 20, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Social Engineering for the Blue Teamβ11Feb 1, 2024Updated 2 years ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with otheβ¦β3,731Sep 13, 2023Updated 2 years ago
- WIreless Hacking Toolsβ167Aug 5, 2013Updated 12 years ago
- Instgram hackingβ164Dec 13, 2023Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.β15Jun 5, 2017Updated 8 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.β22Mar 16, 2018Updated 8 years ago
- β1,395Apr 25, 2021Updated 4 years ago