intere / hacking
Source code from Hacking: The Art of Exploitation (Second Edition).
☆408Updated 8 months ago
Related projects: ⓘ
- A Course on Intermediate Level Linux Exploitation☆977Updated 4 years ago
- tools for security researchers: pentesting, CTF, wargames☆146Updated last month
- Linux Binary Exploitation☆1,295Updated 3 years ago
- Challenges for Binary Exploitation Workshop☆590Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,876Updated 2 years ago
- Exhaustive list of hacking tools☆265Updated 4 years ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆483Updated 3 years ago
- ☆1,374Updated 3 years ago
- Code from Blackhat Python book☆184Updated 5 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,104Updated 3 years ago
- The platform used to run picoCTF 2019. (deprecated)☆285Updated 4 months ago
- Tutorials for getting started with Pwntools☆1,363Updated 8 months ago
- CTF Field Guide☆1,310Updated 3 weeks ago
- offsec batteries included☆1,492Updated 6 months ago
- Things we learned from Capture The Flag hacking competitions we participated in.☆248Updated 3 years ago
- Resources for learning about Exploit Development☆355Updated 3 years ago
- hacking-tutorials☆323Updated 3 years ago
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆252Updated 8 years ago
- Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.☆175Updated 3 years ago
- All the resources I could find for learning Ethical Hacking and penetration testing.☆301Updated 3 years ago
- Penetration Testing notes, resources and scripts☆655Updated 7 months ago
- Material for the YouTube series☆503Updated 2 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆204Updated 5 years ago
- virus collection source code☆409Updated last year
- Vulnerable server used for learning software exploitation☆988Updated 3 years ago
- An in depth tutorial on how to do binary exploitation☆449Updated 6 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆255Updated 5 years ago
- Hack Night is an open weekly training session run by the OSIRIS lab.☆1,219Updated 5 months ago
- ☆230Updated 6 months ago