paulveillard / cybersecurity-exploit-developmentLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆27Updated 3 years ago
Alternatives and similar repositories for cybersecurity-exploit-development
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
Sorting:
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆18Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆39Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- ☆25Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- Tools used for Pentesting☆21Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆26Updated last year
- ☆24Updated 8 months ago
- vulnlab.com reaper writeup☆26Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 7 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- ☆22Updated 2 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆27Updated 3 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated last month