Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson
☆22Mar 24, 2020Updated 6 years ago
Alternatives and similar repositories for Hacking-The-Art-of-Exploitation
Users that are interested in Hacking-The-Art-of-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- Corrupted files generator. Random bits flipper.☆29Oct 30, 2023Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Google Dorking Payloads☆13Jun 24, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Original PoC for CVE-2023-30367☆17Jan 4, 2024Updated 2 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆23Oct 13, 2020Updated 5 years ago
- ☆25Dec 28, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 6 months ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- HEVD Exploits for fun and learning.☆16Aug 30, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Awesome Operational Security resources☆45Dec 2, 2016Updated 9 years ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆69Sep 25, 2023Updated 2 years ago
- GitHub Pages☆17Jul 25, 2018Updated 7 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆62Sep 14, 2022Updated 3 years ago
- ☆17Sep 25, 2024Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆20Jun 6, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes☆32Aug 16, 2025Updated 8 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- ☆38Jan 7, 2025Updated last year
- Import Device Tree Information onto your Ghidra memory map☆34Updated this week
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- ☆13Jun 11, 2024Updated last year