The best resources for learning exploit development
☆124Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for exploit_training
Users that are interested in exploit_training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- Resources for learning about Exploit Development☆431Oct 1, 2020Updated 5 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,112May 27, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 3 months ago
- x64 Windows Exploit Development☆117Aug 24, 2024Updated last year
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64May 21, 2023Updated 3 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,145Dec 9, 2025Updated 5 months ago
- Gonna share my writeups and resources here☆72Jan 16, 2025Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53May 1, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Linux kernel source tree☆18Mar 11, 2026Updated 2 months ago
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- ☆13Jun 5, 2014Updated 11 years ago
- A Course on Intermediate Level Linux Exploitation☆1,015Aug 24, 2020Updated 5 years ago
- Yet Another Vulnerability Database☆16Jul 23, 2021Updated 4 years ago
- Dump WiFi passwords on Windows 10☆23Jan 25, 2018Updated 8 years ago
- A workshop for students that want to learn the basics of Arduino.☆16Oct 5, 2020Updated 5 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 7 years ago
- List of Awesome Advanced Windows Exploitation References☆1,562Jan 13, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Easy red team phishing with Puppeteer☆133Feb 6, 2023Updated 3 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 3 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,002Feb 24, 2025Updated last year
- https://exploit.courses/☆20Apr 14, 2018Updated 8 years ago
- Collection of resources for my preparation to take the OSEE certification.☆313Sep 9, 2020Updated 5 years ago
- ☆136Jun 28, 2023Updated 2 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆124Jul 7, 2023Updated 2 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Dec 8, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,973Dec 9, 2021Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆144Aug 4, 2021Updated 4 years ago
- ☆24Apr 28, 2024Updated 2 years ago
- Malware Analysis Tools☆33Oct 26, 2019Updated 6 years ago
- ☆11Dec 8, 2025Updated 5 months ago