intere / hacking
Source code from Hacking: The Art of Exploitation (Second Edition).
☆424Updated last year
Alternatives and similar repositories for hacking:
Users that are interested in hacking are comparing it to the libraries listed below
- Challenges for Binary Exploitation Workshop☆605Updated 2 years ago
- A Course on Intermediate Level Linux Exploitation☆996Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆268Updated 6 years ago
- CTFs, solutions and presentations☆287Updated 2 weeks ago
- Please refer to The Treasure Trove repo below and read the guidelines before accessing this database☆77Updated 9 years ago
- collection of articles/books about programing☆567Updated last year
- An in depth tutorial on how to do binary exploitation☆449Updated 6 years ago
- A list of the resources I use as I get ready for the exam☆501Updated 2 years ago
- Pythonic ransomware proof of concept.☆217Updated 4 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆454Updated 2 years ago
- Hacking: The Art of Exploitation, 2nd Edition☆24Updated 11 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆211Updated 5 years ago
- Code from Blackhat Python book☆187Updated 6 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,181Updated 4 years ago
- MSFvenom Payload Creator (MSFPC)☆1,253Updated 3 years ago
- A colleciton of CTF write-ups all using pwntools☆510Updated 8 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,960Updated 2 years ago
- Material for the YouTube series☆508Updated 3 years ago
- Linux Binary Exploitation☆1,324Updated 3 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆621Updated 2 months ago
- An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and A…☆500Updated 10 months ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆507Updated 6 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆906Updated 3 years ago
- The platform used to run picoCTF 2019. (deprecated)☆295Updated 10 months ago
- Post Exploitation Wiki☆516Updated 5 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆176Updated 3 months ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆273Updated 4 years ago
- tools which can be used by forensics experts and ethical hackers☆179Updated 8 years ago
- Notes for taking the OSCP in 2097. Read in book form on GitBook☆620Updated 7 years ago
- Exhaustive list of hacking tools☆287Updated 4 years ago