Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation capture the flag
capture-the-flag
x
exploitation
x
3 search results found
Awesome Hacking Resources
⭐
14,679
A collection of hacking / penetration testing resources to make you better!
Pwntools
⭐
11,336
CTF framework and exploit development library
Pwndbg
⭐
6,337
Exploit Development and Reverse Engineering with GDB Made Easy
Gef
⭐
6,203
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Mbe
⭐
5,301
Course materials for Modern Binary Exploitation by RPISEC
Ctf All In One
⭐
3,754
CTF竞赛权威指南
Ssrfmap
⭐
2,306
Automatic SSRF fuzzer and exploitation tool
Sudo_killer
⭐
2,032
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
One_gadget
⭐
1,897
The best tool for finding one gadget RCE in libc.so.6
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Libc Database
⭐
1,505
Build a database of libc offsets to simplify exploitation
Awesome Hacking
⭐
928
awesome hacking chinese version
How To Exploit A Double Free
⭐
881
How to exploit a double free vulnerability in 2021. 'Use After Free for Dummies'
Shellen
⭐
799
🌸 Interactive shellcoding environment to easily craft shellcodes
Exploit Writeups
⭐
737
A collection where my current and future writeups for exploits/CTF will go
Like Dbg
⭐
713
Fully dockerized Linux kernel debugging environment
Security Data Analysis And Visualization
⭐
681
2018-2020青年安全圈-活跃技术博主/博客
Exploit_me
⭐
637
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Ctf Notes
⭐
574
Everything needed for doing CTFs
Hyperpwn
⭐
531
A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda
Ctf Tasks
⭐
530
An archive of low-level CTF challenges developed over the years
Pwndra
⭐
526
A collection of pwn/CTF related utilities for Ghidra
Kernel Security Learning
⭐
514
Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel CVE debug.
Ctf Workshop
⭐
511
Challenges for Binary Exploitation Workshop
Kernelpwn
⭐
432
kernel-pwn and writeup collection
Asiagaming
⭐
420
My Chrome and Safari exploit code + write-up repo
How2kernel
⭐
372
This Repository aims at giving a basic idea about Kernel Exploitation.
Heapwn
⭐
318
Linux Heap Exploitation Practice
Armpwn
⭐
315
Repository to train/learn memory corruption on the ARM platform.
Ctf Literature
⭐
301
Collection of free books, papers and articles related to CTF challenges.
Covermyass
⭐
227
Post-exploitation tool to cover your tracks on a compromised machine
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Linux Soft Exploit Suggester
⭐
204
Search Exploitable Software on Linux
Resource List
⭐
199
GitHub Project Resource List
Karkinos
⭐
185
A thorough library database to assist with binary exploitation tasks.
Ctf Awesome Resources
⭐
185
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Destructivefarm
⭐
182
📢 🔒 Exploit manager for attack-defense CTF competitions
Tryhackme Ctf
⭐
178
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Ctf Tool
⭐
166
A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.
Exploits
⭐
160
Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Pwn_docker_example
⭐
156
Example pwnable challenge hosted with docker
35c3ctf
⭐
143
35C3 Junior CTF pwnables
Search Libc
⭐
137
Web wrapper of niklasb/libc-database
Write Ups
⭐
134
Write-ups for various CTF
Empirectf
⭐
123
EmpireCTF – write-ups, capture the flag, cybersecurity
35c3_modern_windows_userspace_exploitation
⭐
120
Tryhackme
⭐
111
Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.
Albatar
⭐
106
Albatar is a SQLi exploitation framework in Python
Pwn
⭐
103
A Windows & Linux pwn library to play with modern C++ (and yeah, it's pwn++, not pwn--). It's mostly a toy library constantly changing, don't expect stability
Spellbook
⭐
96
Framework for rapid development of offensive security tools
Heapinfo
⭐
96
An interactive memory info for pwning / exploiting
Exploiting
⭐
95
Exploiting challenges in Linux and Windows
Ctf_writeups
⭐
80
CTFの解法をまとめる。
Linux Kernel Ctf
⭐
79
Helper scripts for hosting a Linux kernel exploitation CTF challenge
Escapeme
⭐
75
TokyoWestens CTF 4th 2018 EscapeMe challenge
Cybersecurity Resources
⭐
73
Resources for learning about cybersecurity and CTFs
Rsaexploits
⭐
72
On Pwning
⭐
72
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
Remenissions
⭐
64
Pwnworks
⭐
60
Exploitation challenges for CTF
Scuffed_low_level_stash
⭐
58
Stash for Binary Exploitation and Reverse Engineering Resources
Chall.stypr.com
⭐
57
Stereotyped Challenges (2014~2023)
Hacking Resources
⭐
55
This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any illegal work using these sources.
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Elgoog
⭐
52
elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit
Exploits_challenges
⭐
52
Challenges and vulnerabilities exploitation.
Pwnscripts
⭐
51
Very simple script(s) to hasten binary exploit creation
Binary
⭐
51
Sleep_Pwn_f1sh
Gitctf
⭐
49
Git-based CTF
Winpwn
⭐
49
Windows Pwnable Study
Binary Exploitation
⭐
45
Good to know, easy to forget information about binaries and their exploitation!
Pwn Just In Time Exploit
⭐
42
Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)
Windowsland
⭐
41
HITCON CTF 2018
Ctfmate
⭐
40
Ctf
⭐
38
Something about CTF and vulnerability environment, mainly about kernel exploit.
Privescker
⭐
37
Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in one go.
Blindpie
⭐
37
Automatically exploit time-based blind SQL injection vulnerabilities.
Exploit_farm
⭐
37
The utility for CTF hacker competition for team hacking and flag submitting
Feuerfuchs
⭐
37
Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge
Tryhackme
⭐
29
Writeups on my TryHackMe adventures!
Rhme 2016
⭐
28
The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition provides a completely different set of new challenges to test your skills in side channel, fault injection, cryptoanalysis and software exploitation attacks.
Redteamcheatsheet
⭐
28
All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.
Ctf
⭐
27
My CTF write-ups
V8 Starter Guide
⭐
26
Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Exploit 공부를 시작하는 사람들을 위한 Build부터 Exploit까지 한국어 가이드. 공부하면서 적어본 것이라 틀린 정보가 많습니다. 있다면 알려주세요!
1n3
⭐
25
Founder of @Sn1perSecurity LLC. Creator of Sn1per. Top 20 worldwide on @bugcrowd in 2016. OSCE/OSCP/CISSP/Security+
How To Self Learn Infosec
⭐
24
Ans to the FAQ: How do you self-learn information security?
Police Quest
⭐
22
Binary exploitation CTF challenge
Ctf Write Up
⭐
22
TEAM BAY'S CTF WRITE UP
Cypherpunks Ctf
⭐
22
Cypherpunks CTF 智能合約漏洞攻擊
Formatstring Exploit
⭐
21
Dead simple format string exploit payload generator
33c3ctf Repl
⭐
21
Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF
Ctf
⭐
21
CTF programs and writeups
35c3ctf_nokia
⭐
21
Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft
Web Exploitation Workflow
⭐
20
Web Exploitation Workflow for CTF Challenges
Ctf Challenge
⭐
20
An attempt to unite CTF players and bug bounty hunters by sharing a binary that needs CTF-style attention.
Pwn Writeups
⭐
19
CTF pwn problem writeup
Awesome Pwnable
⭐
19
Awesome Pwnable
Security Resources
⭐
19
A list of stuff to learn more about security!
Inshack 2017
⭐
18
Challenges for INShAck
Github_arsenal
⭐
18
github军火库
Related Searches
Python Exploitation (1,616)
Python Capture The Flag (888)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Security Exploitation (439)
Exploitation Penetration Testing (353)
1-3 of 3 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.