Software Exploitation
โ11Sep 22, 2025Updated 5 months ago
Alternatives and similar repositories for software-exploitation-dojo
Users that are interested in software-exploitation-dojo are comparing it to the libraries listed below
Sorting:
- ๐๐ข๐ฏ๐บ ๐ฐ๐ง ๐ต๐ฉ๐ฆ๐ด๐ฆ ๐ด๐ค๐ณ๐ช๐ฑ๐ต๐ด ๐ข๐ณ๐ฆ ๐ค๐ฐ๐ญ๐ญ๐ฆ๐ค๐ต๐ฆ๐ฅ ๐ง๐ณ๐ฐ๐ฎ ๐ค๐ฐ๐ถ๐ณ๐ด๐ฆ๐ด, ๐ฃ๐ญ๐ฐ๐จ๐ด, ๐ค๐ฐ๐ฎ๐ฎ๐ถ๐ฏ๐ช๐ต๐บ ๐ณ๐ฆ๐ด๐ฐ๐ถ๐ณ๐ค๏ฟฝโฆโ26Nov 30, 2025Updated 3 months ago
- Paper editor toolโ10Sep 3, 2023Updated 2 years ago
- a jax benchmark for ad hoc teamworkโ19Updated this week
- Linux group_info refcounter overflow use afer freeโ13May 4, 2014Updated 11 years ago
- Quantum Insert Backdoor POCโ11May 21, 2017Updated 8 years ago
- This repo contains mindmap and content regarding reflected xss.โ11Aug 11, 2020Updated 5 years ago
- Abusing fts3_tokenizerโ12Jan 18, 2016Updated 10 years ago
- โ13Jun 26, 2021Updated 4 years ago
- Parameter discovery and fuzzing toolโ12Oct 25, 2022Updated 3 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Executionโ14Apr 28, 2024Updated last year
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new oneโฆโ13Dec 18, 2016Updated 9 years ago
- Get start with RL, todayโ14Sep 9, 2025Updated 6 months ago
- Random tips and tricks RE: ransomwareโ14Aug 17, 2021Updated 4 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzingโ20Aug 31, 2012Updated 13 years ago
- NYU's Introduction to Deep Learning Researchโ47Feb 10, 2026Updated 3 weeks ago
- A course offered by Stanford Universityโ14Sep 4, 2020Updated 5 years ago
- Funny Fuzzing Wordlistโ14Jun 14, 2022Updated 3 years ago
- Extract uncompiled, uncompressed SPA code from Webpack source maps. A fork of @rarecoil's work.โ13Jul 11, 2024Updated last year
- ๐ฒ golang port of Delgan's python loguru (just logging)โ11Jan 1, 2026Updated 2 months ago
- A tool to brute force forms based authentication mechanismโ11Nov 2, 2019Updated 6 years ago
- Networkscanner written in rustโ10May 29, 2020Updated 5 years ago
- โ14Jun 26, 2013Updated 12 years ago
- Easy discovery of assetsโ13Jun 22, 2022Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etcโ15Feb 9, 2020Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsโ14Feb 9, 2015Updated 11 years ago
- Automating SQL Injection in a list of URLs or Request Filesโ13Aug 8, 2016Updated 9 years ago
- โ12Aug 18, 2023Updated 2 years ago
- NSE script to detect ProxyOracleโ13Aug 30, 2021Updated 4 years ago
- Archive for acez.re blog.โ21Apr 17, 2023Updated 2 years ago
- โ12Feb 1, 2022Updated 4 years ago
- Learning notes and code from CS 329S: Machine Learning Systems Design series.โ20Jun 23, 2025Updated 8 months ago
- โ16Dec 28, 2016Updated 9 years ago
- Example of how you can create your own dojoโ12Sep 2, 2025Updated 6 months ago
- Awesome Secure Codingโ18Feb 13, 2026Updated 3 weeks ago
- โ20Nov 13, 2025Updated 3 months ago
- [Coursera] Data Structures and Algorithms Specialization by "University of California San Diego", "National Research University Higher Scโฆโ15Apr 1, 2020Updated 5 years ago
- Dev Ubuntu 20.04 Docker image, with Oh-My-Zsh/Pyenv/GNU&LLVM Build Tools, suitable as a temp sysrootโ13Aug 10, 2022Updated 3 years ago
- Syllabus for Fall 2024 session of CSC413/2516, Neural Networks and Deep Learningโ15Sep 7, 2024Updated last year
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The cโฆโ17Mar 30, 2023Updated 2 years ago