awesome-exploit-development
awesome-honeypots
awesome-exploit-development | awesome-honeypots | |
---|---|---|
3 | 21 | |
1,779 | 8,077 | |
- | - | |
0.0 | 5.9 | |
almost 2 years ago | about 2 months ago | |
Python | ||
MIT License | Artistic License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-exploit-development
-
Cybersecurity Repositories
Exploit Development
-
Where can I learn windows binary exploitation from the basics?
All you need here github.com
-
security researcher assistant
exploit dev usually has its roots in software development and debugging. and essentially your "exploit" is also running inside another process, so if you mess up any existing memory or register, you are going to kill yourself if the process segfault. anyway, there are many resources: a. Protostar: https://github.com/sidchn/Protostar-Exploit-Development-Exercise and many youtubes video associated with these. b. https://github.com/FabioBaroni/awesome-exploit-development c. https://github.com/ihack4falafel/OSCE d. https://github.com/KaoRz/exploits_challenges e. https://github.com/Lazenca/Exploit-tech f. https://github.com/naivenom/exploiting
awesome-honeypots
- Building a Windows Honeypots?
- Covenant C2 - unrecognized connections
- Wordlists
-
I have 10 Linux VMs that I want to run a bash script on misconfiguring OS layer options. Comment your ideas! More info in post.
you're looking for a honeypot
-
How to make honeypots.
You may be interested in https://github.com/paralax/awesome-honeypots
- What is the best open source honeypot? [Need Experiences]
- Intentionally Vulnerable Website
-
Cybersecurity 101 — What is a Honeypot?
Also you might want to check these lists here and here for deploying some more honeypots.
-
Cybersecurity Repositories
Honeypots
-
Using honeypots data to create IOCs collection
Agreed with u/Sloky, if you want catch internal adversaries you may need a lot of tweaking. There are plenty of good lists out there such as this and this and this one
What are some alternatives?
exploits_challenges - Challenges and vulnerabilities exploitation.
tpotce - 🍯 T-Pot - The All In One Honeypot Platform 🐝
OSCE - Collection of things made during my preparation to take on OSCE
Awesome-WAF - 🔥 Web-application firewalls (WAFs) from security standpoint.
APTnotes - Various public documents, whitepapers and articles about APT campaigns
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
hacker101 - Source code for Hacker101.com - a free online web and mobile security class.
free-programming-books - :books: Freely available programming books
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
hacker-roadmap - A collection of hacking tools, resources and references to practice ethical hacking.
dvws-node - Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.