jopraveen / exploit-developmentLinks
Gonna share my writeups and resources here
☆67Updated 8 months ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below
Sorting:
- Practice Labs☆98Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- This repo explains in details about buffer overflow exploit development for windows executable.☆45Updated last year
- A curated list of resources for the OSED journey.☆66Updated 3 years ago
- The best resources for learning exploit development☆118Updated 5 years ago
- An OSWE Guide☆116Updated 4 years ago
- ☆98Updated 4 years ago
- ☆190Updated last year
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆52Updated 4 months ago
- ☆82Updated 7 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆154Updated 3 months ago
- ☆61Updated 3 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆109Updated 2 years ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆141Updated 2 weeks ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Information Security Information From Web☆28Updated last month
- A collection of my adventures through hackthebox.eu☆35Updated 4 years ago
- This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach i…☆88Updated 3 years ago
- esoteric☆54Updated 5 years ago
- ☆132Updated 4 years ago
- Challenge files☆11Updated 3 years ago
- ☆95Updated 6 months ago
- This is the open source version of vulnerable.codes platform.☆26Updated 4 months ago
- ☆35Updated 2 years ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆114Updated 2 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆78Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 7 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆226Updated last year