midnightslacker / exploit_trainingLinks
The best resources for learning exploit development
☆115Updated 5 years ago
Alternatives and similar repositories for exploit_training
Users that are interested in exploit_training are comparing it to the libraries listed below
Sorting:
- Collection of resources for my preparation to take the OSEE certification.☆279Updated 4 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆103Updated 2 years ago
- ☆186Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A curated list of resources for the OSED journey.☆64Updated 3 years ago
- ☆99Updated 3 years ago
- Gonna share my writeups and resources here☆65Updated 5 months ago
- ☆83Updated 7 years ago
- esoteric☆54Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- Practice Labs☆92Updated 4 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆99Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆222Updated last year
- ☆68Updated 3 years ago
- A comprehensive Hypervisor resources repo☆110Updated last week
- 0xpat blog☆100Updated 3 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- ☆43Updated 8 months ago
- ☆307Updated 3 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- OSEE Preparation☆181Updated 6 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆48Updated 4 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆54Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆205Updated 11 months ago
- ☆63Updated 4 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆48Updated last month
- x64 Windows Exploit Development☆111Updated 10 months ago
- List of red team resources☆94Updated 7 years ago