paulveillard / cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆25Updated 2 years ago
Alternatives and similar repositories for cybersecurity-exploit-development
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
Sorting:
- C2Matrix Automation☆11Updated last year
- ☆20Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆44Updated 3 weeks ago
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆20Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- Pentesting notes☆17Updated 2 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 11 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆16Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆26Updated 10 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- ☆19Updated last year
- ☆27Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆37Updated 2 years ago
- AppsecStudy - open-source elearning management system for information security☆9Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆13Updated 6 months ago
- Simple recon tool automates your recon process☆17Updated 2 years ago