wtsxDev / Exploit-Development
Resources for learning about Exploit Development
☆387Updated 4 years ago
Alternatives and similar repositories for Exploit-Development:
Users that are interested in Exploit-Development are comparing it to the libraries listed below
- Collection of resources for my preparation to take the OSEE certification.☆274Updated 4 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆647Updated 8 months ago
- The best resources for learning exploit development☆113Updated 5 years ago
- ☆435Updated 2 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆958Updated 2 years ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆548Updated 4 years ago
- Hack-the-Box-OSCP-Preparation☆802Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- ⚠️ malware development☆538Updated 10 months ago
- Resources for Windows exploit development☆1,569Updated 3 years ago
- Don't let buffer overflows overflow your mind☆438Updated 4 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆558Updated last year
- Labs for Practical Malware Analysis & Triage☆957Updated 2 weeks ago
- ☆224Updated last year
- ☆183Updated last year
- Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)☆364Updated 2 years ago
- Organized list of my malware development resources☆1,550Updated 2 years ago
- Pure Malware Development Resource Collections☆272Updated 3 months ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆541Updated 9 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆738Updated 4 years ago
- All in One OSCP Preparation Material☆517Updated 8 months ago
- My own OSCP guide☆820Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆635Updated 9 months ago
- ☆395Updated 4 years ago
- Vulnerable server used for learning software exploitation☆1,035Updated 4 years ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆533Updated last week
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆289Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- ☆1,554Updated last year
- Resources for learning about cybersecurity and CTFs☆205Updated 2 years ago