exploit-exercises
There are 40 repositories under exploit-exercises topic.
ihack4falafel/OSCE
Collection of things made during my preparation to take on OSCE
naivenom/exploiting
Exploiting challenges in Linux and Windows
ihack4falafel/OSEE
Collection of things made during my preparation to take on OSEE
therealdreg/x64dbg-exploiting
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Lazenca/Exploit-tech
Example files to experience basic exploit techniques.
KaoRz/exploits_challenges
Challenges and vulnerabilities exploitation.
enovella/exploitrainings
Exploitation on different architectures (x86, x64, arm, mips, avr)
tagnullde/Exploit-Development
My collection of self-written exploits
nipunjaswal/Mastering-Metasploit
Metasploit Modules from Mastering Metasploit Book
SunshineCTF/SunshineCTF-2019-Public
Repository of challenges for SunshineCTF 2019
mayanez/min-dop
Minimal Data-Oriented Programming (DOP) Vulnerability + Exploits
0x27/wargames
wargame/challenge solutions
DSTCyber/from-crashes-to-exploits
Introductory presentation on stack-based buffer overflows
Ingenuity-Fainting-Goats/damn-vulnerable-tiny-web-server
Damn Vulnerable Tiny Web Server - A deliberately insecure webserver for learning purpose
r4gnax/Sploits-Protostar
Protostar exploit python scripts
escollapse/python-fun
python scripts that have served utility
JElchison/launch-bash-without-aslr
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
ParthKolekar/protostar-pwntools
protostar exercises solved using pwntools
AntonUden/XSS-Example
xss vulnerable chat used to learn how to perform and protect against xss attacks
g147/protostar-exploits
lame exploits developed for protostar
Lensual/Struts2-045-Exp-CSharp
Development with C# WinForm. Just for study and programming excercises.
m0nsieurPsych0/RAT-ReverseShell
Projet final de la technique informatique de gestion au Cegep du Vieux montréal. Le but était de créer un ver informatique avec des fonctionnalités de controle à distance et d'exfiltration de données.
OllieReynolds/phpBB-2.0.12-exploits
Applying known exploits (based on CVE db info) to a phpBB deploy, for fun!
donovanconrad/cybersecurity_projects
Cyber Security Projects - Donovan Conrad
Gallopsled/gallopsled.github.io
Pwntools Blog
limitedeternity/ExploitEducation
Notes and exploits
lucianoscarpaci/project-wp-vs-kali
🐉 Experience a detailed showcase of exploit discovery, analysis, reproduction, and documentation of five XSS vulnerabilities impacting an outdated WordPress version. 🔍💻📄
physine/exploit_education_Phoenix
This is a solution set the problems found at exploit education
pradeepgokul/bufferoverflow
Sample Project(Testing)
wr47h/exploit-exercises.com-Solutions
Solutions for the VMs on exploit-exercises.com
Apohub55/Slient-URL-Exploit
🛡️ Expose and analyze hidden URL exploits that enable undetected downloads and drive-by installations of malicious software during online activities.
CJSKWT/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
CJSKWT/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
CJSKWT/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
CJSKWT/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Katirinata/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.