intere / hackingLinks
Source code from Hacking: The Art of Exploitation (Second Edition).
☆437Updated last year
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Code from Blackhat Python book☆187Updated 6 years ago
- Material for the YouTube series☆508Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆998Updated 4 years ago
- Exhaustive list of hacking tools☆298Updated 5 years ago
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆285Updated 9 years ago
- Challenges for Binary Exploitation Workshop☆617Updated 2 years ago
- Linux Binary Exploitation☆1,339Updated 4 years ago
- hacking-tutorials☆340Updated 4 years ago
- Reverse Engineering Tutorials☆522Updated 6 years ago
- Hack Night is an open weekly training session run by the OSIRIS lab.☆1,248Updated last year
- collection of articles/books about programing☆576Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,010Updated 3 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆199Updated 8 months ago
- Scripts I use during pentest engagements.☆1,010Updated 4 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆329Updated 8 years ago
- All the resources I could find for learning Ethical Hacking and penetration testing.☆317Updated 4 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day…☆365Updated last year
- An in depth tutorial on how to do binary exploitation☆452Updated 7 years ago
- Please refer to The Treasure Trove repo below and read the guidelines before accessing this database☆81Updated 10 years ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆484Updated 3 years ago
- A list of the resources I use as I get ready for the exam☆503Updated 2 years ago
- All my Hacking|Pentesting Notes☆325Updated 9 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,248Updated 4 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆462Updated 8 years ago
- Powerful plugins and add-ons for hackers☆864Updated last year
- tools which can be used by forensics experts and ethical hackers☆179Updated 9 years ago
- Tutorials for getting started with Pwntools☆1,497Updated 10 months ago
- GitHub Project Resource List☆355Updated 8 years ago
- CEHv9 - Practice Exam Questions with Answers☆69Updated 7 years ago