A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Windows Exploitation.
☆51Jan 6, 2024Updated 2 years ago
Alternatives and similar repositories for cybersecurity-windows-exploitation
Users that are interested in cybersecurity-windows-exploitation are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about SSL / TLS☆23Jun 24, 2024Updated last year
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆19Feb 29, 2024Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆18Oct 27, 2023Updated 2 years ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆89Oct 9, 2024Updated last year
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆113Oct 9, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆18Aug 24, 2025Updated 6 months ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆59Mar 4, 2023Updated 3 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jul 5, 2022Updated 3 years ago
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- this repo is for windows privilege escalation technique☆53Aug 28, 2021Updated 4 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆227Jan 27, 2025Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆43Jun 28, 2022Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science stu…☆19Mar 6, 2022Updated 4 years ago
- ☆11Jan 28, 2025Updated last year
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆25Dec 28, 2022Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- Proof Of Concepts☆55Jan 4, 2026Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Mass report tool for social media platform Snapchat☆13Mar 14, 2023Updated 2 years ago
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆30Feb 24, 2026Updated last week
- Graphs in Cybersecurity - Bloodhound☆20Oct 8, 2024Updated last year
- ☆150Mar 22, 2024Updated last year