H2HC Community Project to Create Exploit Challenges for Practicing
☆20Nov 24, 2012Updated 13 years ago
Alternatives and similar repositories for exploit-challenges
Users that are interested in exploit-challenges are comparing it to the libraries listed below
Sorting:
- Presentations in different conferences☆38Oct 17, 2019Updated 6 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Jun 6, 2022Updated 3 years ago
- [- mxmap -]☆11Apr 9, 2025Updated 11 months ago
- ☆21Mar 24, 2015Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- ☆11Dec 8, 2025Updated 3 months ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆13Sep 4, 2019Updated 6 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- EyesOfNetwork 5.1 to 5.3 exploits☆13Mar 5, 2020Updated 6 years ago
- Funtenna reference design☆12Jan 10, 2014Updated 12 years ago
- Some binaries/scripts that may be useful in red team/pentest exercises☆22Feb 25, 2026Updated 3 weeks ago
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- ☆50Dec 28, 2012Updated 13 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- Projects For the HackRF One☆14Aug 13, 2014Updated 11 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Docker files from Ettus Research☆16Aug 11, 2020Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Study group working through Black Hat Python: https://www.nostarch.com/blackhatpython☆14Jun 8, 2017Updated 8 years ago
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/plcscan☆18Sep 5, 2015Updated 10 years ago
- ☆90Jun 15, 2022Updated 3 years ago
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bounty☆24Apr 7, 2025Updated 11 months ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Python tools for webscraping at pydata conference☆16Apr 8, 2016Updated 9 years ago
- A native macOS GUI wrapper built on top of searchsploit CLI.☆15Mar 18, 2018Updated 8 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- A TUI for Active Directory collection.☆132Updated this week
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- ☆10Feb 9, 2018Updated 8 years ago