wtsxDev / Exploit-DevelopmentLinks
Resources for learning about Exploit Development
☆397Updated 4 years ago
Alternatives and similar repositories for Exploit-Development
Users that are interested in Exploit-Development are comparing it to the libraries listed below
Sorting:
- The best resources for learning exploit development☆115Updated 5 years ago
- Collection of resources for my preparation to take the OSEE certification.☆281Updated 4 years ago
- ☆144Updated 4 months ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- ☆452Updated 2 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆727Updated 10 months ago
- A curated list of awesome reverse engineering resources for various topics☆542Updated 11 months ago
- A Huge Learning Resources with Labs For Offensive Security Players☆973Updated 3 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆656Updated last year
- Resources for Windows exploit development☆1,600Updated 3 years ago
- Organized list of my malware development resources☆1,584Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆223Updated last year
- Gray Hat Hacking v6☆177Updated last year
- ☆232Updated 2 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆816Updated 2 years ago
- ☆187Updated last year
- Resources for learning about cybersecurity and CTFs☆210Updated 2 years ago
- Don't let buffer overflows overflow your mind☆440Updated 5 years ago
- ☆46Updated 9 months ago
- ☆545Updated 3 years ago
- ⚠️ malware development☆568Updated last year
- Labs for Practical Malware Analysis & Triage☆986Updated 3 months ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆553Updated 4 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆648Updated last year
- Collection of Pentest Notes and Cheatsheets☆378Updated 3 weeks ago
- A workshop about Malware Development☆1,681Updated 2 years ago
- Vulnerable server used for learning software exploitation☆1,054Updated 4 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆755Updated 4 years ago
- Hack-the-Box-OSCP-Preparation☆821Updated 4 years ago
- Pure Malware Development Resource Collections☆312Updated 6 months ago