sergey-pronin / Awesome-Vulnerability-ResearchLinks
π¦ A curated list of the awesome resources about the Vulnerability Research
β1,259Updated 4 years ago
Alternatives and similar repositories for Awesome-Vulnerability-Research
Users that are interested in Awesome-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ2,020Updated 3 years ago
- List of Awesome Advanced Windows Exploitation Referencesβ1,514Updated 3 years ago
- A Course on Intermediate Level Linux Exploitationβ1,001Updated 5 years ago
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.β286Updated 9 years ago
- awesome list of browser exploitation tutorialsβ2,214Updated 2 years ago
- Linux Binary Exploitationβ1,342Updated 4 years ago
- Great security list for fun and profitβ1,820Updated 2 years ago
- A Collection of Hacks in IoT Space so that we can address them (hopefully).β2,294Updated 5 years ago
- π A collection of cheatsheets for various infosec tools and topics.β1,341Updated 3 years ago
- Hack Night is an open weekly training session run by the OSIRIS lab.β1,259Updated last year
- My curated list of awesome links, resources and tools on infosec related topicsβ1,124Updated last month
- πΎ a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnetsβ¦β206Updated 9 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice onβ¦β5,623Updated last year
- Challenges for Binary Exploitation Workshopβ621Updated 2 years ago
- A curated list of awesome privilege escalationβ1,414Updated last month
- A curated list of awesome Fuzzing(or Fuzz Testing) for software securityβ914Updated last year
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)β786Updated 10 months ago
- An archive of low-level CTF challenges developed over the yearsβ640Updated 3 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the pβ¦β1,082Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.β1,821Updated 2 months ago
- βοΈ A curated list of CVE PoCs.β3,438Updated 3 years ago
- A collection of resources for linux reverse engineeringβ2,052Updated 3 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenariosβ1,347Updated 2 years ago
- Collection of the cheat sheets useful for pentestingβ4,133Updated last year
- A list of Reverse Engineering articles, books, and papersβ2,553Updated 2 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.β902Updated 5 years ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.β1,704Updated 3 years ago
- A sorted and updated list of security wargame sites.β1,070Updated last week
- Everything needed for doing CTFsβ764Updated last year
- A curated list of awesome embedded and IoT security resources.β2,094Updated last year