The best resources for learning exploit development
☆124Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for exploit_training
Users that are interested in exploit_training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆31May 24, 2020Updated 5 years ago
- Resources for learning about Exploit Development☆429Oct 1, 2020Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,107May 27, 2022Updated 3 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64May 21, 2023Updated 2 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,118Dec 9, 2025Updated 4 months ago
- Gonna share my writeups and resources here☆72Jan 16, 2025Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆88Jun 29, 2023Updated 2 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53May 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Linux kernel source tree☆18Mar 11, 2026Updated 3 weeks ago
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- ☆13Jun 5, 2014Updated 11 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,317Dec 7, 2020Updated 5 years ago
- ☆16Aug 2, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- List of Awesome Advanced Windows Exploitation References☆1,556Jan 13, 2022Updated 4 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,978Feb 24, 2025Updated last year
- https://exploit.courses/☆20Apr 14, 2018Updated 7 years ago
- Collection of resources for my preparation to take the OSEE certification.☆308Sep 9, 2020Updated 5 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Aug 4, 2021Updated 4 years ago
- ☆24Apr 28, 2024Updated last year
- Malware Analysis Tools☆33Oct 26, 2019Updated 6 years ago