Knowledge Base of Exploitation Techniques
☆60Apr 30, 2025Updated 10 months ago
Alternatives and similar repositories for exploitation-grimoire
Users that are interested in exploitation-grimoire are comparing it to the libraries listed below
Sorting:
- A Pwning Toolkit☆28Jan 11, 2025Updated last year
- Proof Of Concepts☆55Jan 4, 2026Updated 2 months ago
- A Project where I try to learn something new every day, and this is a place to track it☆18Oct 11, 2021Updated 4 years ago
- WIP - Revamped Alfred [2.0]☆40May 8, 2025Updated 10 months ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆25Mar 10, 2026Updated last week
- My write-up on TryHackMe, HackTheBox, and CTF.☆71Dec 16, 2020Updated 5 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- ☆23Jul 18, 2023Updated 2 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 5 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 8 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated last month
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 6 months ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- English translation of Cyberhub CTF guidebook + add-ons☆18Jul 10, 2020Updated 5 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- Some exploits I have written to showcase and to share☆53Mar 24, 2021Updated 4 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- RE / Binary Exploitation Resources☆73Dec 1, 2017Updated 8 years ago
- Updated GNU Screen 4.5.0 Exploit: This repository hosts an enhanced exploit for GNU Screen 4.5.0, optimized for Kali Linux 2024. It inclu…☆19Jun 10, 2024Updated last year
- ☆177Jul 22, 2022Updated 3 years ago