Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation exploit development
exploit-development
x
exploitation
x
22 search results found
Nuclei Templates
⭐
7,614
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Pwndbg
⭐
6,337
Exploit Development and Reverse Engineering with GDB Made Easy
Gef
⭐
6,203
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Hacksysextremevulnerabledriver
⭐
2,208
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Awesome Exploit Development
⭐
1,175
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
Herpaderping
⭐
986
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Exploit Writeups
⭐
752
A collection where my current and future writeups for exploits/CTF will go
Like Dbg
⭐
713
Fully dockerized Linux kernel debugging environment
Heap Viewer
⭐
666
IDA Pro plugin to examine the glibc heap, focused on exploit development
Fireelf
⭐
657
fireELF - Fileless Linux Malware Framework
Ronin
⭐
600
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Linux Exploit Development Tutorial
⭐
436
a series tutorial for linux exploit development to newbie.
Android Kernel Exploitation
⭐
381
Android Kernel Exploitation
Ropium
⭐
314
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Exploit Pattern
⭐
188
generate and search pattern string for exploit development
Shadowsteal
⭐
185
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pwnshop
⭐
144
Exploit Development, Reverse Engineering & Cryptography
Exploit Framework
⭐
139
🔥 An Exploit framework for Web Vulnerabilities written in Python
Write Ups
⭐
134
Write-ups for various CTF
Cryptolocker
⭐
123
CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster.
Erc.xdbg
⭐
121
An Xdbg Plugin of the ERC Library.
Vulnerable Kext
⭐
120
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Cve 2023 38831 Rarce
⭐
110
An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23
Z0fcourse_exploitdevelopment
⭐
99
x64 Windows Exploit Development
Exploiting
⭐
95
Exploiting challenges in Linux and Windows
Exploit Development
⭐
74
Resources for learning about Exploit Development
Ronin Exploits
⭐
59
A Ruby micro-framework for writing and running exploits
Exploit Development
⭐
51
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
Twiga
⭐
44
A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports android 4.2 to android 7.1.1
Gdb_commands
⭐
37
GDB commands to aid exploit development
Setapprovalforall_drainer
⭐
31
🔥 Best Drainer on the market right now updates every week 🔥 Drains Native coin, NFT, Tokens. ⭐STABLE OPERATION IS GUARANTEED⭐
Async_wake_ios
⭐
29
iOS 11.1.2 kernel exploit and PoC local kernel debugger by @i41nbeer (https://bugs.chromium.org/p/project-zero/issues/d
Shellcode
⭐
25
A collection of shellcodes for BSD and Linux for exploit development
Bst
⭐
23
Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs. 😎
Exploits
⭐
21
This repository contains multiple exploits I have written for various CVEs and CTFs
Yookiterm Challenges Files
⭐
18
Challenge files which are deployed in the container for the user
Exploit_training
⭐
18
The best resources for learning exploit development
Libctf
⭐
18
CTF exploit development and other tools of pwnage
Erc.xdbg
⭐
17
An Xdbg Plugin of the ERC Library.
Exploit Me
⭐
16
Exploit development challenges!
Slient Url Exploit Slient Builder Exploit Database Cve 2023 Malware
⭐
16
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Stack Based Overflow
⭐
11
basic shit about stack based overflows
Gef Legacy
⭐
10
Legacy version of GEF running for GDB+Python2
Ctftooldirectory
⭐
9
List of helpful tools for every CTF Category
Slient Doc Pdf Exploit Builder Fud Malware Cve
⭐
8
Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.
Re_mal_exploit_tutorials
⭐
8
my reading list for reverse engineering malware & exploit development
Pwn Docker
⭐
8
Collection of docker images to be used for exploit development and testing
Exim Rce Cve 2018 6789
⭐
8
This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.
Php 8.1.0 Dev Backdoor Rce
⭐
7
PHP 8.1.0-dev Backdoor System Shell Script
Exploit Development And Pentesting
⭐
7
My notes, exercises, and reports on reverse engineering and penetrating applications
Vulnexipy
⭐
7
Vulnerabilities exploitation examples, python
Moria
⭐
6
Python library for interacting with in-memory C structures using data mined from binary DWARF debug info.
Shellcode Extractor
⭐
6
Python script to extract shellcode from object/executable files
Exploit 0x41 Buffer Overflow
⭐
5
Exploit Development 0x41: Buffer Overflooooooooooow
Slient Doc
⭐
5
Cve 2023 39063
⭐
5
POC of the CVE-2023-39063
Pylibcdb
⭐
5
libc_database python wrapper for exploit automation
Related Searches
Python Exploitation (1,616)
Exploitation Cve (741)
Vulnerabilities Exploitation (645)
C Exploitation (544)
Security Exploitation (389)
Exploitation Penetration Testing (353)
Javascript Exploitation (268)
Exploitation Rce (235)
Exploitation Capture The Flag (231)
C Plus Plus Exploitation (180)
1-22 of 22 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2025 Awesome Open Source. All rights reserved.