The best resources for learning exploit development
☆124Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for exploit_training
Users that are interested in exploit_training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- Resources for learning about Exploit Development☆430Oct 1, 2020Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,109May 27, 2022Updated 3 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- x64 Windows Exploit Development☆116Aug 24, 2024Updated last year
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64May 21, 2023Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53May 1, 2020Updated 6 years ago
- Linux kernel source tree☆18Mar 11, 2026Updated last month
- Resources for Windows exploit development☆1,652Dec 20, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- ☆13Jun 5, 2014Updated 11 years ago
- A Course on Intermediate Level Linux Exploitation☆1,012Aug 24, 2020Updated 5 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,320Dec 7, 2020Updated 5 years ago
- Yet Another Vulnerability Database☆16Jul 23, 2021Updated 4 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Feb 17, 2021Updated 5 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Feb 18, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- List of Awesome Advanced Windows Exploitation References☆1,560Jan 13, 2022Updated 4 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,992Feb 24, 2025Updated last year
- https://exploit.courses/☆20Apr 14, 2018Updated 8 years ago
- ☆136Jun 28, 2023Updated 2 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Dec 8, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- This is our internal Team Progress Tracker for the 100days of hacking☆32Jun 21, 2021Updated 4 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,967Dec 9, 2021Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆144Aug 4, 2021Updated 4 years ago