H2HC Community Project to Create Exploit Challenges for Practicing
☆20Nov 24, 2012Updated 13 years ago
Alternatives and similar repositories for exploit-challenges
Users that are interested in exploit-challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Presentations in different conferences☆38Oct 17, 2019Updated 6 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- ☆11Dec 8, 2025Updated 4 months ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- ☆50Dec 28, 2012Updated 13 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- Docker files from Ettus Research☆16Aug 11, 2020Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/plcscan☆18Sep 5, 2015Updated 10 years ago
- My Ubuntu 22.04 VPS general configs and scripts I use for bug bounty☆24Apr 15, 2026Updated 2 weeks ago
- ☆90Jun 15, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Blackhat 2012 Sample Codes☆95Jul 13, 2016Updated 9 years ago
- Organ1k: JS1k contest entry☆25Feb 4, 2012Updated 14 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- An Open Source Malware Analysis Pipeline System☆158Jun 1, 2021Updated 4 years ago
- Because you need to control your AMIs☆35Apr 11, 2022Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- ☆10Feb 9, 2018Updated 8 years ago
- NRG core files for Arduino IDE☆10Sep 12, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40May 6, 2014Updated 11 years ago
- ELF patching library in Python☆25Mar 15, 2021Updated 5 years ago
- mood light using electron and APA102C LEDs☆16Sep 5, 2016Updated 9 years ago
- Experiments with K66 Ethernet☆13Aug 20, 2016Updated 9 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- bil verification tool☆12Jun 30, 2022Updated 3 years ago
- Create command line applications with a config file.☆16Mar 7, 2017Updated 9 years ago