intere / hackingLinks
Source code from Hacking: The Art of Exploitation (Second Edition).
☆445Updated last year
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Code from Blackhat Python book☆187Updated 6 years ago
- Reverse Engineering Tutorials☆522Updated 7 years ago
- Challenges for Binary Exploitation Workshop☆625Updated 3 years ago
- Please refer to The Treasure Trove repo below and read the guidelines before accessing this database☆81Updated 10 years ago
- hacking-tutorials☆342Updated 4 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆330Updated 9 years ago
- A Course on Intermediate Level Linux Exploitation☆1,003Updated 5 years ago
- Exhaustive list of hacking tools☆310Updated 5 years ago
- Material for the YouTube series☆510Updated 3 years ago
- collection of articles/books about programing☆578Updated last year
- All my Hacking|Pentesting Notes☆331Updated 9 years ago
- Things we learned from Capture The Flag hacking competitions we participated in.☆256Updated 4 years ago
- All the resources I could find for learning Ethical Hacking and penetration testing.☆325Updated 5 years ago
- Some Reverse Engineering Tutorials for Beginners☆269Updated 2 years ago
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆292Updated 9 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆213Updated last week
- Linux Binary Exploitation☆1,349Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,046Updated 3 years ago
- This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day…☆377Updated last year
- Black Hat Python Labs☆103Updated 6 years ago
- An in depth tutorial on how to do binary exploitation☆452Updated 7 years ago
- Repository for the Smartphone Pentest Framework (SPF)☆458Updated 8 years ago
- Writeup for picoCTF 2018☆126Updated 3 years ago
- the main hackademic code repository☆323Updated 5 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆276Updated 5 years ago
- The platform used to run picoCTF 2019. (deprecated)☆309Updated last year
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,281Updated 4 years ago
- Scripts I use during pentest engagements.☆1,017Updated 5 years ago
- A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.☆549Updated 4 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆460Updated 3 years ago