paulveillard / cybersecurity-exploit-developmentLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆28Updated 3 years ago
Alternatives and similar repositories for cybersecurity-exploit-development
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆36Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- ☆12Updated 3 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 3 weeks ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated last year
- ☆38Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- ☆24Updated 5 months ago
- ☆21Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- C2Matrix Automation☆11Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago