https://exploit.courses/
☆19Apr 14, 2018Updated 7 years ago
Alternatives and similar repositories for exploit-courses
Users that are interested in exploit-courses are comparing it to the libraries listed below
Sorting:
- ☆26Mar 21, 2022Updated 3 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- Scripts to manage sidecar☆10Jun 25, 2019Updated 6 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Volumetric Development☆11Mar 19, 2024Updated last year
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Jtag parsing scripts☆10Oct 14, 2023Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆11Nov 24, 2022Updated 3 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated 3 weeks ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Extract files using QR Codes☆10Feb 10, 2018Updated 8 years ago
- ARP cache poisoning implementation using Scapy☆13Jul 14, 2019Updated 6 years ago
- the rounding error tool 🚩☆14May 16, 2025Updated 9 months ago
- Примеры для курса "Программирование в Windows"☆10Nov 28, 2021Updated 4 years ago
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- Udemy – Linux Heap Exploitation☆54Jun 14, 2021Updated 4 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- A small research about finding stupid C-string related bugs☆13Jun 29, 2022Updated 3 years ago
- Animated 3D backgrounds for your website☆10Jun 25, 2022Updated 3 years ago
- A linux based program that encrypts or decrypts a file☆12Jan 5, 2022Updated 4 years ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆23Jan 23, 2026Updated last month
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/protostar-solutions☆13Mar 26, 2015Updated 10 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- public-pentesting-reports☆12Aug 23, 2016Updated 9 years ago
- Firmware for STM8 based R/C transmitter for StreamingGPS Drone☆13May 21, 2018Updated 7 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- Gives medals to TOR relays☆10Jan 23, 2017Updated 9 years ago
- ☆11May 25, 2023Updated 2 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year
- Plugin for Reveal.js to use ALT + ARROWS to navigate☆10Jan 5, 2018Updated 8 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago