Exploit-Challenges
Exploit practice tools
A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills
A collection of vulnerable ARM binaries for practicing exploit development
898 stars
62 watching
169 forks
Language: C
last commit: about 3 years ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
bkerler/exploit_me | An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. | 895 |
stephenbradshaw/vulnserver | A tool designed to help developers learn how to find and exploit buffer overflow bugs in software | 1,001 |
pyroxenites/boftools | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
rosehgal/binexp | A tutorial project on exploiting binary files and writing payloads to manipulate program behavior | 1,303 |
lockedbyte/cve-exploits | A collection of proof-of-concept exploits for specific software vulnerabilities | 675 |
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 524 |
babyteam1024/cve-2021-2394 | An exploit for a Java vulnerability | 9 |
matterpreter/offensivecsharp | A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,381 |
al1ex/csplugins | A collection of Cobaltstrike PowerShell plugins designed to simplify exploitation and penetration testing | 404 |
mubix/post-exploitation | A collection of post-exploitation tools and scripts for various operating systems. | 1,554 |
demi6od/smashing_the_browser | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
abatchy17/windowsexploits | A collection of precompiled Windows exploit binaries | 1,829 |
emo-crab/scap-rs | A collection of Rust libraries for working with vulnerability data from various sources. | 16 |
kibercthulhu/gdb-peda-cheatsheet | A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
1n3/intruderpayloads | A collection of tools and methodologies for simulating web application attacks | 3,681 |