Collection of resources I have used throughout my studies (cybersecurity and systems)
☆231Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆199Mar 14, 2024Updated 2 years ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- An updated collection of resources targeting browser-exploitation.☆829Mar 8, 2021Updated 5 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆155Jan 23, 2024Updated 2 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- Resources for Browser Security Research☆54Sep 17, 2022Updated 3 years ago
- A list of helpful cybersecurity / infosec resources☆1,356Nov 19, 2024Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 3 years ago
- ☆341Jan 23, 2022Updated 4 years ago
- ☆30Nov 25, 2025Updated 4 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆200Jul 27, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 8 months ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆860Jun 4, 2020Updated 5 years ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,736Jun 3, 2024Updated last year
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆77Dec 28, 2021Updated 4 years ago
- kernel-pwn and writeup collection☆705Oct 2, 2023Updated 2 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆720Oct 19, 2024Updated last year
- ☆22Dec 1, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Sep 22, 2020Updated 5 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Nov 20, 2021Updated 4 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- ☆105Dec 9, 2019Updated 6 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- PoC code for CVE-2019-14040☆27Apr 15, 2020Updated 5 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆801Aug 18, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- List of Awesome Advanced Windows Exploitation References☆1,553Jan 13, 2022Updated 4 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- binary ninja related code☆37Mar 27, 2025Updated last year
- awesome list of browser exploitation tutorials☆2,272Sep 18, 2023Updated 2 years ago
- ☆23Nov 5, 2021Updated 4 years ago