Hack Night is an open weekly training session run by the OSIRIS lab.
☆1,270Apr 5, 2024Updated 2 years ago
Alternatives and similar repositories for Hack-Night
Users that are interested in Hack-Night are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A place to discuss potential projects for students of the ISIS Lab.☆385Jun 28, 2013Updated 12 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,973Dec 9, 2021Updated 4 years ago
- A curated list of awesome infosec courses and training resources.☆5,661Nov 21, 2025Updated 6 months ago
- Course materials for Malware Analysis by RPISEC☆4,023Aug 26, 2022Updated 3 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆215May 13, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A repository of challenges from various CTF competitions.☆157Apr 13, 2014Updated 12 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- A repository for learning various heap exploitation techniques.☆8,650May 15, 2026Updated last week
- CTF framework and exploit development library☆13,446May 14, 2026Updated last week
- CTF Field Guide☆1,424Nov 15, 2024Updated last year
- A curated list of CTF frameworks, libraries, resources and softwares☆11,535Jul 22, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- A curated list of resources for learning about application security☆6,910Feb 22, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Course on Intermediate Level Linux Exploitation☆1,015Aug 24, 2020Updated 5 years ago
- Some setup scripts for security research tools.☆9,400May 2, 2026Updated 2 weeks ago
- Post Exploitation Collection☆1,575May 1, 2020Updated 6 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- The Bug Hunters Methodology☆4,325Aug 1, 2023Updated 2 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,544May 11, 2026Updated last week
- A collected list of awesome security talks☆4,211Feb 17, 2026Updated 3 months ago
- A collection of awesome penetration testing resources, tools and other shiny things☆26,149Jan 25, 2026Updated 3 months ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,945Oct 20, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of resources for linux reverse engineering☆2,076Jun 2, 2022Updated 3 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,117Jul 29, 2024Updated last year
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,813Apr 3, 2024Updated 2 years ago
- A general collection of information, tools, and tips regarding CTFs and similar security competitions☆1,811Feb 25, 2021Updated 5 years ago
- Defund the Police.☆13,769Jun 7, 2024Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,623Oct 2, 2018Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2014☆1,855Apr 27, 2016Updated 10 years ago
- A colleciton of CTF write-ups all using pwntools☆524Oct 5, 2016Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,191Jul 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,513Sep 22, 2024Updated last year
- CTF write-ups from the VulnHub CTF Team☆720Apr 2, 2018Updated 8 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆239Mar 6, 2025Updated last year
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- A list of web application security☆6,826Apr 28, 2026Updated 3 weeks ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- List of Awesome Red Teaming Resources☆7,917Dec 28, 2023Updated 2 years ago