Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploit development
exploit-development
x
112 search results found
X64dbg
⭐
42,376
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
H4cker
⭐
15,693
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Nuclei Templates
⭐
7,614
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Pwndbg
⭐
6,337
Exploit Development and Reverse Engineering with GDB Made Easy
Gef
⭐
6,203
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Hacksysextremevulnerabledriver
⭐
2,208
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Rp
⭐
1,641
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
Awesome Exploit Development
⭐
1,175
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
Awesome Vulnerability Research
⭐
1,065
🦄 A curated list of the awesome resources about the Vulnerability Research
Herpaderping
⭐
986
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Scripts
⭐
788
Scripts I use during pentest engagements.
Exploit Writeups
⭐
737
A collection where my current and future writeups for exploits/CTF will go
Like Dbg
⭐
713
Fully dockerized Linux kernel debugging environment
Heap Viewer
⭐
666
IDA Pro plugin to examine the glibc heap, focused on exploit development
Fireelf
⭐
637
fireELF - Fileless Linux Malware Framework
Ronin
⭐
600
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Linux Exploit Development Tutorial
⭐
436
a series tutorial for linux exploit development to newbie.
Android Kernel Exploitation
⭐
381
Android Kernel Exploitation
Ropium
⭐
314
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Werdlists
⭐
296
⌨️ Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases
Hydroxide
⭐
294
Penetration testing tool for games developed on the Roblox game engine.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Out Of Tree
⭐
209
out-of-tree kernel {module, exploit} development tool
Vulnfanatic
⭐
196
A Binary Ninja plugin for vulnerability research.
Oscp
⭐
193
My OSCP notes
Go Exploit
⭐
190
A Go-based Exploit Framework
Exploit Pattern
⭐
188
generate and search pattern string for exploit development
Shadowsteal
⭐
185
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Exrop
⭐
164
Automatic ROPChain Generation
Shellcode_encoder
⭐
146
x64 printable shellcode encoder
Research
⭐
145
VerSprite Security Research
Ida Sploiter
⭐
145
IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerability research tool.
Pwnshop
⭐
144
Exploit Development, Reverse Engineering & Cryptography
Exploit Framework
⭐
139
🔥 An Exploit framework for Web Vulnerabilities written in Python
The_hive
⭐
137
My public notes about offensive security
Write Ups
⭐
134
Write-ups for various CTF
Pwntools Ruby
⭐
128
pwntools on Ruby!
Cryptolocker
⭐
123
CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Erc.xdbg
⭐
121
An Xdbg Plugin of the ERC Library.
Vulnerable Kext
⭐
120
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Cve 2023 38831 Rarce
⭐
110
An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23
Z0fcourse_exploitdevelopment
⭐
99
x64 Windows Exploit Development
Exploiting
⭐
95
Exploiting challenges in Linux and Windows
Hands On Penetration Testing With Python
⭐
76
Hands-On Penetration Testing with Python, published by Packt
Exploit Development
⭐
74
Resources for learning about Exploit Development
Slink
⭐
73
Alphanumeric Shellcode (x86) Encoder
Ronin Exploits
⭐
59
A Ruby micro-framework for writing and running exploits
Hidden Screen Capture
⭐
52
It is primary designed to be hidden and monitoring the computer activity. Take a screenshot of desktop in hidden mode using Visual C++ and save automatically to 'jpeg' file in every 30 second. 60+ Most Popular antivirus not detect this application while it is running on background.
Exploit Development
⭐
51
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
Twiga
⭐
44
A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports android 4.2 to android 7.1.1
Gdb_commands
⭐
37
GDB commands to aid exploit development
All In One Cybersecurity Resources
⭐
36
List of CyberSecurity Resources and some different Sub-Sets of CyberSecurity
Pattern
⭐
35
Python implementation of Metasploit's pattern_create/pattern_offset.
Sploitkit
⭐
35
A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploits)
Subrosa
⭐
33
Basic tool to automate backdooring PE files
Cve Stockpile
⭐
31
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Setapprovalforall_drainer
⭐
31
🔥 Best Drainer on the market right now updates every week 🔥 Drains Native coin, NFT, Tokens. ⭐STABLE OPERATION IS GUARANTEED⭐
Simos18_sboot
⭐
30
Documentation and tools about Simos18 SBOOT (Supplier Bootloader), including a Seed/Key bypass and Tricore boot password recovery tool.
Async_wake_ios
⭐
29
iOS 11.1.2 kernel exploit and PoC local kernel debugger by @i41nbeer (https://bugs.chromium.org/p/project-zero/issues/d
Ronin Support
⭐
25
A support library for Ronin. Like activesupport, but for hacking!
Shellcode
⭐
25
A collection of shellcodes for BSD and Linux for exploit development
Syscall_number
⭐
25
This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).
Readhook
⭐
24
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Shellcode_ia32
⭐
23
Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natural language descriptions. The dataset can be used for neural machine translation tasks to automatically generate software exploits from natural language.
Buffer Overflow Exploit Development
⭐
23
This repo explains in details about buffer overflow exploit development for windows executable.
Bst
⭐
23
Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs. 😎
Exploits
⭐
21
This repository contains multiple exploits I have written for various CVEs and CTFs
Limbernie.github.io
⭐
20
my security journey
Exploit_training
⭐
18
The best resources for learning exploit development
Libpwu
⭐
18
Process exploitation library for Linux.
Yookiterm Challenges Files
⭐
18
Challenge files which are deployed in the container for the user
Ronin Payloads
⭐
18
A Ruby micro-framework for writing and running exploit payloads
Libctf
⭐
18
CTF exploit development and other tools of pwnage
Erc.xdbg
⭐
17
An Xdbg Plugin of the ERC Library.
Slient Url Exploit Slient Builder Exploit Database Cve 2023 Malware
⭐
16
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Greed
⭐
16
A symbolic execution engine for EVM smart contract binaries
Exploit Me
⭐
16
Exploit development challenges!
Awesome Hacking
⭐
14
A collection of various awesome lists for hackers, pentesters and security researchers
Gdb Memstr
⭐
13
Generate arbitrary strings out of contents of ELF sections
Ropgadget Rs
⭐
12
Another (bad) ROP gadget finder, but this time in Rust
Codetz
⭐
12
Misc stuff
Reai Ghidra
⭐
12
RevEng.AI Ghidra Plugin
Stack Based Overflow
⭐
11
basic shit about stack based overflows
Batchman E Robby
⭐
11
BatchMan & Robby is Simple Script Written in Batch just for fun, only works on Windows XP systems or lower (on w10 it can work if the autorun function is enabled in advance) Once downloaded, you have to burn it to CD or DVD as a data disc THE CD starts immediately whit autorun function and crash the system.. Normally it is not detected by any antivirus
Gef Legacy
⭐
10
Legacy version of GEF running for GDB+Python2
Ctftooldirectory
⭐
9
List of helpful tools for every CTF Category
Get Shodan
⭐
8
The program allows to download large data from shodan quickly, simply and avoid errors.
Re_mal_exploit_tutorials
⭐
8
my reading list for reverse engineering malware & exploit development
Ecoshell
⭐
8
Shellcode generation for eCOS platform.
Pwn Docker
⭐
8
Collection of docker images to be used for exploit development and testing
Exim Rce Cve 2018 6789
⭐
8
This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.
Slient Doc Pdf Exploit Builder Fud Malware Cve
⭐
8
Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.
Erc.net
⭐
8
A collection of tools for debugging Windows application crashes.
Gottern
⭐
8
Golang port for Metasploit's pattern_create and pattern_offset
Reait
⭐
8
RevEng.AI Toolkit and Python API
Ollysseh
⭐
7
ollysseh ollydbg plugin
S4ch.github.io
⭐
7
Another random blog about security
Huawei_hg255s_exploit
⭐
7
🚀 Server Directory Traversal at Huawei HG255s ☄️ - CVE-2017-17309 🚀
Vulnexipy
⭐
7
Vulnerabilities exploitation examples, python
Php 8.1.0 Dev Backdoor Rce
⭐
7
PHP 8.1.0-dev Backdoor System Shell Script
1-100 of 112 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.