The best resources for learning exploit development
☆124Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for exploit_training
Users that are interested in exploit_training are comparing it to the libraries listed below
Sorting:
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Resources for learning about Exploit Development☆427Oct 1, 2020Updated 5 years ago
- my reading list for reverse engineering malware & exploit development☆15Feb 3, 2026Updated 3 weeks ago
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- x64 Windows Exploit Development☆116Aug 24, 2024Updated last year
- A Huge Learning Resources with Labs For Offensive Security Players☆1,103Dec 9, 2025Updated 2 months ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,089May 27, 2022Updated 3 years ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆128Jun 30, 2019Updated 6 years ago
- Gonna share my writeups and resources here☆72Jan 16, 2025Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 11 months ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Feb 17, 2021Updated 5 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Resources for Windows exploit development☆1,649Dec 20, 2021Updated 4 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- My public talks☆14Oct 1, 2024Updated last year
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Crackme collections☆13May 24, 2020Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 2 years ago
- ☆135Jun 28, 2023Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 4 years ago