A tutorial and resources for exploit development learners
☆10Jan 25, 2021Updated 5 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Game design develops the game on its theoretical level☆12May 2, 2022Updated 3 years ago
- The official frontend of Cryptic☆11Feb 4, 2023Updated 3 years ago
- Automating the labelling of microstructure patterns in microscope images of welding joints☆11Jun 10, 2018Updated 7 years ago
- A bot for the reddit r/place event 2022☆16Apr 4, 2022Updated 3 years ago
- Best advance Termux Banner (Next update Coming soon)☆29Feb 17, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- The official website of cryptic-game☆18Jun 12, 2023Updated 2 years ago
- The official repository of Cryptic☆35Feb 18, 2022Updated 4 years ago
- A small Command line tool to execute commands from your console while your bot is running.☆21May 28, 2023Updated 2 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week
- ☆14Sep 28, 2023Updated 2 years ago
- A Template for fastapi-framework☆12Oct 20, 2025Updated 5 months ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆36Dec 23, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Feb 24, 2020Updated 6 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- Official BlackArch Linux PKGBUILD templates.☆33Feb 2, 2026Updated last month
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- ☆16Oct 6, 2023Updated 2 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- User-agent Fuzzing Library. This repository holds data of all the user agents in the `user_agents.json` file, which can be used directly …☆17Jun 29, 2025Updated 8 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆27Mar 9, 2024Updated 2 years ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- ☆12Feb 3, 2024Updated 2 years ago
- 3.50-5.07 PS4 Kernel Dumper☆24May 31, 2020Updated 5 years ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆20Nov 10, 2024Updated last year
- ☆28Aug 26, 2021Updated 4 years ago
- IOC/Hash scanner and IDS layer 4 designed to be portable and fast☆27Jan 28, 2026Updated last month
- Agentic LLM CTF to test prompt injection attacks and preventions☆30Mar 17, 2026Updated last week
- ropr with some tweaks for better linux kernel support☆38Apr 25, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- build your own yubikey☆15Dec 29, 2018Updated 7 years ago
- A lightweight c-based launcher (native messaging host) for "Open With" addon (firefox & chrome)☆13Jan 2, 2018Updated 8 years ago
- ☆125Updated this week
- a repo of links to useful writeups of pwn challenges☆31Jul 22, 2018Updated 7 years ago
- Object Detection 2Dto3D by Yolov5 ,TensorRT ,Matched by clustering☆34Dec 27, 2020Updated 5 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- Here you can find my found CVEs and Vulnerabilities and how it can help you to learn from it.☆18Feb 18, 2025Updated last year