paulveillard / cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆19Updated 2 years ago
Alternatives and similar repositories for cybersecurity-exploit-development:
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆17Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 5 months ago
- Challenge Python☆19Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- ☆17Updated last year
- ☆22Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆32Updated 4 years ago
- Security Operation Center Lab☆16Updated 3 months ago
- Tactics, Techniques, and Procedures☆23Updated 10 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- A learning and testing environment for web application hacking and pentesting.☆25Updated 4 years ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 11 months ago
- ☆18Updated last year
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆16Updated 2 years ago
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- ☆24Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 6 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Repository of cybersecurity mindmaps☆30Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated last month
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago