Source code from Hacking: The Art of Exploitation (Second Edition).
☆453Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Source files and summarized reports for some of the chapters and examples in the book.☆20Aug 15, 2017Updated 8 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆312Nov 30, 2018Updated 7 years ago
- Notes to the book☆20Oct 29, 2015Updated 10 years ago
- A curated list of awesome Hacking tutorials, tools and resources☆15,916Jun 2, 2024Updated last year
- Ha3Mrx Pentesting and Security Hacking☆438Nov 15, 2024Updated last year
- Free Security and Hacking eBooks☆4,813Jul 10, 2019Updated 6 years ago
- Please refer to The Treasure Trove repo below and read the guidelines before accessing this database☆83Jul 11, 2015Updated 10 years ago
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- Awesome hacking is an awesome collection of hacking tools.☆3,783Updated this week
- A list of web application security☆6,818Feb 27, 2026Updated 3 weeks ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆200Aug 15, 2023Updated 2 years ago
- A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.☆555Feb 11, 2021Updated 5 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 7 years ago
- A collection of hacking / penetration testing resources to make you better!☆16,850Mar 12, 2024Updated 2 years ago
- This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.☆21Apr 23, 2018Updated 7 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆6,282Jul 26, 2024Updated last year
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- gSAST - Grep Static Analysis Security Tool☆13Mar 30, 2024Updated last year
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- Exhaustive list of hacking tools☆316May 15, 2020Updated 5 years ago
- collection of articles/books about programing☆586Dec 20, 2023Updated 2 years ago
- Z Shadow - Hacking Facebook with Shadowave Phishing☆49Feb 6, 2024Updated 2 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆5,405Jun 20, 2024Updated last year
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Single stop for security related stuff☆58Nov 20, 2016Updated 9 years ago
- CTF framework and exploit development library☆13,315Mar 5, 2026Updated 2 weeks ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,028Feb 12, 2023Updated 3 years ago
- Python Powered Repository☆15Jan 22, 2020Updated 6 years ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,725Sep 13, 2023Updated 2 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Instgram hacking☆163Dec 13, 2023Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago