sergey-pronin / Awesome-Vulnerability-ResearchLinks
π¦ A curated list of the awesome resources about the Vulnerability Research
β1,280Updated 4 years ago
Alternatives and similar repositories for Awesome-Vulnerability-Research
Users that are interested in Awesome-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Developmentβ2,044Updated 3 years ago
- List of Awesome Advanced Windows Exploitation Referencesβ1,525Updated 3 years ago
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.β291Updated 9 years ago
- A Course on Intermediate Level Linux Exploitationβ1,002Updated 5 years ago
- awesome list of browser exploitation tutorialsβ2,228Updated 2 years ago
- Linux Binary Exploitationβ1,348Updated 4 years ago
- A Collection of Hacks in IoT Space so that we can address them (hopefully).β2,337Updated 5 years ago
- Great security list for fun and profitβ1,833Updated 2 years ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software securityβ934Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice onβ¦β5,677Updated last year
- π A collection of cheatsheets for various infosec tools and topics.β1,353Updated 3 years ago
- A curated list of awesome privilege escalationβ1,464Updated 3 months ago
- Everything needed for doing CTFsβ772Updated 2 years ago
- πΎ a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnetsβ¦β210Updated this week
- My curated list of awesome links, resources and tools on infosec related topicsβ1,138Updated 3 months ago
- A Curated list of Security Resources for all connected thingsβ3,044Updated last month
- βοΈ A curated list of CVE PoCs.β3,458Updated 3 years ago
- Tutorials for getting started with Pwntoolsβ1,526Updated last year
- Challenges for Binary Exploitation Workshopβ624Updated 3 years ago
- A curated list of awesome embedded and IoT security resources.β2,145Updated 2 years ago
- An archive of low-level CTF challenges developed over the yearsβ647Updated 3 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenariosβ1,352Updated 2 years ago
- CTF Field Guideβ1,394Updated last year
- Hack Night is an open weekly training session run by the OSIRIS lab.β1,264Updated last year
- A curated list of resources related to Industrial Control System (ICS) security.β1,859Updated last month
- Stuff about it-security that might be good to knowβ1,021Updated 2 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the pβ¦β1,104Updated 3 years ago
- A sorted and updated list of security wargame sites.β1,110Updated 3 weeks ago
- A collection of resources for linux reverse engineeringβ2,061Updated 3 years ago
- Interview questions to screen offensive (red team/pentest) candidatesβ884Updated 6 years ago