ExploitDevelopment
Popular repositories Loading
-
HackSysExtremeVulnerableDriver
HackSysExtremeVulnerableDriver PublicForked from hacksysteam/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
C 1
-
tcache-exploitation
tcache-exploitation PublicForked from ktecv2000/tcache-exploitation
TCACHE (thread local caching in glibc malloc) attack vector common in heap exploitation
C
-
Screwed-Drivers
Screwed-Drivers PublicForked from eclypsium/Screwed-Drivers
"Screwed Drivers" centralized information source for code references, links, etc.
PowerShell
-
SignedUEFIShell
SignedUEFIShell PublicForked from HackingThings/SignedUEFIShell
Information about a signed UEFI Shell that can be used when Secure Boot is enabled.
Python
-
-
LibAFL
LibAFL PublicForked from AFLplusplus/LibAFL
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
Rust
Repositories
- Fuzzing101 Public Forked from antonio-morales/Fuzzing101
An step by step fuzzing tutorial. A GitHub Security Lab initiative
ExploitDevelopment/Fuzzing101’s past year of commit activity - exploit_mitigations Public Forked from nccgroup/exploit_mitigations
Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
ExploitDevelopment/exploit_mitigations’s past year of commit activity - diagrams Public Forked from mingrammer/diagrams
🎨 Diagram as Code for prototyping cloud system architectures
ExploitDevelopment/diagrams’s past year of commit activity - SyscallPack Public Forked from epichoxha/SyscallPack
BOF and Shellcode for full DLL unhooking using dynamic syscalls
ExploitDevelopment/SyscallPack’s past year of commit activity - SysWhispers3 Public Forked from klezVirus/SysWhispers3
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
ExploitDevelopment/SysWhispers3’s past year of commit activity - BadBlood Public Forked from davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active D
ExploitDevelopment/BadBlood’s past year of commit activity - Reverse-Engineering Public Forked from mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
ExploitDevelopment/Reverse-Engineering’s past year of commit activity - how-to-exploit-a-double-free Public Forked from stong/how-to-exploit-a-double-free
How to exploit a double free vulnerability in 2021. 'Use-After-Free for Dummies'
ExploitDevelopment/how-to-exploit-a-double-free’s past year of commit activity
People
This organization has no public members. You must be a member to see who’s a part of this organization.
Top languages
Loading…
Most used topics
Loading…