Software Exploitation
☆11Sep 22, 2025Updated 6 months ago
Alternatives and similar repositories for software-exploitation-dojo
Users that are interested in software-exploitation-dojo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example of how you can create your own dojo☆12Sep 2, 2025Updated 6 months ago
- Networkscanner written in rust☆10May 29, 2020Updated 5 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 8 months ago
- Intro to Cybersecurity☆21Mar 3, 2026Updated 3 weeks ago
- A dojo to teach the basics of low-level computing.☆24Feb 17, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- NCTF 2023 challenges and writeups☆15Dec 30, 2023Updated 2 years ago
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- A Linux kernel module written in Rust☆35Jul 31, 2018Updated 7 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- A simple global allocator for Rust which hooks into `libc`. Useful in `no_std` contexts.☆27Mar 19, 2024Updated 2 years ago
- ☆14Jun 26, 2013Updated 12 years ago
- This repo contains mindmap and content regarding reflected xss.☆11Aug 11, 2020Updated 5 years ago
- HTB CDSA Notes I made to reference for the exam.☆33Nov 9, 2024Updated last year
- Archive for acez.re blog.☆21Apr 17, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- Parameter discovery and fuzzing tool☆12Oct 25, 2022Updated 3 years ago
- A kernel written in Rust☆42Feb 2, 2025Updated last year
- Some Python Hacking with my MagTek Card Reader☆28Dec 21, 2011Updated 14 years ago
- 🌲 golang port of Delgan's python loguru (just logging)☆11Jan 1, 2026Updated 2 months ago
- A multi-threaded port scanner and service detection crate☆25Apr 10, 2025Updated 11 months ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆53Updated this week
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Extract uncompiled, uncompressed SPA code from Webpack source maps. A fork of @rarecoil's work.☆13Jul 11, 2024Updated last year
- Tips for manually detect & exploit SQL injection Vulnerability : MySQL☆17Aug 17, 2022Updated 3 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- My payloads for attacks utilizing a rubber ducky, teensy, and digistump☆26Dec 19, 2020Updated 5 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- A collection of disk images that can be used by the QEMU emulator☆23Feb 19, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- GUI tool for sending IOCTL to windows drivers.☆21May 31, 2024Updated last year
- ☆23Mar 3, 2020Updated 6 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- A tool to initialize pwn game exploit enviroment.☆44Nov 27, 2025Updated 4 months ago
- ☆25Mar 18, 2018Updated 8 years ago