wtsxDev / Exploit-DevelopmentLinks
Resources for learning about Exploit Development
☆424Updated 5 years ago
Alternatives and similar repositories for Exploit-Development
Users that are interested in Exploit-Development are comparing it to the libraries listed below
Sorting:
- The best resources for learning exploit development☆123Updated 6 years ago
- Collection of resources for my preparation to take the OSEE certification.☆307Updated 5 years ago
- ☆479Updated 3 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆730Updated 2 months ago
- ☆152Updated 11 months ago
- ☆264Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆236Updated 2 years ago
- Gray Hat Hacking v6☆199Updated last year
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆231Updated 2 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆794Updated last year
- Resources for Windows exploit development☆1,649Updated 4 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,090Updated last month
- A curated list of awesome reverse engineering resources for various topics☆617Updated last year
- Organized list of my malware development resources☆1,697Updated 3 years ago
- Resources for learning about cybersecurity and CTFs☆228Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆828Updated 3 years ago
- ⚠️ malware development☆680Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆683Updated last year
- Infosec blog☆141Updated 3 years ago
- Reverse Engineering Resources☆231Updated 7 years ago
- ☆199Updated last year
- Hack-the-Box-OSCP-Preparation☆874Updated 5 years ago
- Collection of Pentest Notes and Cheatsheets☆393Updated 7 months ago
- Don't let buffer overflows overflow your mind☆448Updated 5 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆929Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Updated 5 years ago
- Labs for Practical Malware Analysis & Triage☆1,072Updated last month
- Vulnerable server used for learning software exploitation☆1,095Updated 5 years ago
- Learn Binary Exploitation with sample problems and solutions☆170Updated 3 years ago
- ☆57Updated last year