GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
-
Updated
May 21, 2024 - Python
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A Go-based Exploit Framework
CTFs solve scripts
Modular penetration testing platform that enables you to write, test, and execute exploit code.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
This repository contains multiple exploits I have written for various CVEs and CTFs
RevEng.AI Toolkit and Python API
RevEng.AI IDA Pro Plugin
A symbolic execution engine for EVM smart contract binaries.
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
An analysis of binary explotation memory corruption vulnerabilities.
Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.
To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."