Software Exploitation
☆11Sep 22, 2025Updated 6 months ago
Alternatives and similar repositories for software-exploitation-dojo
Users that are interested in software-exploitation-dojo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example of how you can create your own dojo☆14Sep 2, 2025Updated 7 months ago
- Networkscanner written in rust☆10May 29, 2020Updated 5 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 8 months ago
- Intro to Cybersecurity☆23Mar 3, 2026Updated last month
- A dojo to teach the basics of low-level computing.☆24Apr 2, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NCTF 2023 challenges and writeups☆15Dec 30, 2023Updated 2 years ago
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- A Linux kernel module written in Rust☆35Jul 31, 2018Updated 7 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- A simple global allocator for Rust which hooks into `libc`. Useful in `no_std` contexts.☆27Mar 19, 2024Updated 2 years ago
- ☆14Jun 26, 2013Updated 12 years ago
- This repo contains mindmap and content regarding reflected xss.☆11Aug 11, 2020Updated 5 years ago
- HTB CDSA Notes I made to reference for the exam.☆34Nov 9, 2024Updated last year
- Archive for acez.re blog.☆21Apr 17, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Parameter discovery and fuzzing tool☆12Oct 25, 2022Updated 3 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- A kernel written in Rust☆42Feb 2, 2025Updated last year
- Some Python Hacking with my MagTek Card Reader☆28Dec 21, 2011Updated 14 years ago
- 🌲 golang port of Delgan's python loguru (just logging)☆11Jan 1, 2026Updated 3 months ago
- A multi-threaded port scanner and service detection crate☆24Apr 10, 2025Updated last year
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆53Apr 2, 2026Updated 2 weeks ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Extract uncompiled, uncompressed SPA code from Webpack source maps. A fork of @rarecoil's work.☆13Jul 11, 2024Updated last year
- Tips for manually detect & exploit SQL injection Vulnerability : MySQL☆17Aug 17, 2022Updated 3 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- My payloads for attacks utilizing a rubber ducky, teensy, and digistump☆26Dec 19, 2020Updated 5 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- A collection of disk images that can be used by the QEMU emulator☆24Feb 19, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Automating SQL Injection in a list of URLs or Request Files☆12Aug 8, 2016Updated 9 years ago
- GUI tool for sending IOCTL to windows drivers.☆21May 31, 2024Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆12Dec 21, 2024Updated last year
- ☆23Mar 3, 2020Updated 6 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- A tool to initialize pwn game exploit enviroment.☆44Nov 27, 2025Updated 4 months ago