paulveillard / cybersecurity-exploit-developmentLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆28Updated 3 years ago
Alternatives and similar repositories for cybersecurity-exploit-development
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
Sorting:
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆27Updated last month
- Enumeration & fingerprint tool☆24Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆37Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆77Updated this week
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- APK Infrastructure Investigator☆63Updated 2 years ago
- ☆25Updated 2 years ago
- OSCP Study Guide☆40Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆17Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago
- C2Matrix Automation☆12Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Upload files done during my research.☆164Updated 4 months ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated 5 months ago
- ☆21Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆94Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 7 months ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated 2 years ago