pwncollege / software-exploitation-dojoView external linksLinks
Software Exploitation
☆11Sep 22, 2025Updated 4 months ago
Alternatives and similar repositories for software-exploitation-dojo
Users that are interested in software-exploitation-dojo are comparing it to the libraries listed below
Sorting:
- a jax benchmark for ad hoc teamwork☆17Updated this week
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Paper editor tool☆10Sep 3, 2023Updated 2 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 2 months ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- This repo contains mindmap and content regarding reflected xss.☆11Aug 11, 2020Updated 5 years ago
- NYU's Introduction to Deep Learning Research☆39Updated this week
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new one…☆13Dec 18, 2016Updated 9 years ago
- Parameter discovery and fuzzing tool☆12Oct 25, 2022Updated 3 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- Get start with RL, today☆14Sep 9, 2025Updated 5 months ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- A course offered by Stanford University☆14Sep 4, 2020Updated 5 years ago
- Networkscanner written in rust☆10May 29, 2020Updated 5 years ago
- 🌲 golang port of Delgan's python loguru (just logging)☆11Jan 1, 2026Updated last month
- A tool to brute force forms based authentication mechanism☆11Nov 2, 2019Updated 6 years ago
- ☆14Jun 26, 2013Updated 12 years ago
- Extract uncompiled, uncompressed SPA code from Webpack source maps. A fork of @rarecoil's work.☆13Jul 11, 2024Updated last year
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- ☆12Aug 18, 2023Updated 2 years ago
- Archive for acez.re blog.☆19Apr 17, 2023Updated 2 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- Syllabus for Fall 2024 session of CSC413/2516, Neural Networks and Deep Learning☆15Sep 7, 2024Updated last year
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- ☆26Jan 16, 2026Updated 3 weeks ago
- Learning notes and code from CS 329S: Machine Learning Systems Design series.☆20Jun 23, 2025Updated 7 months ago
- ☆16Dec 28, 2016Updated 9 years ago
- Example of how you can create your own dojo☆12Sep 2, 2025Updated 5 months ago
- GUI tool for sending IOCTL to windows drivers.☆21May 31, 2024Updated last year
- ☆12Feb 1, 2022Updated 4 years ago
- [Coursera] Data Structures and Algorithms Specialization by "University of California San Diego", "National Research University Higher Sc…☆15Apr 1, 2020Updated 5 years ago
- Dev Ubuntu 20.04 Docker image, with Oh-My-Zsh/Pyenv/GNU&LLVM Build Tools, suitable as a temp sysroot☆13Aug 10, 2022Updated 3 years ago