exploits_challenges VS OSCE

Compare exploits_challenges vs OSCE and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
exploits_challenges OSCE
1 1
59 186
- -
0.0 0.0
over 3 years ago about 2 years ago
Python Python
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

exploits_challenges

Posts with mentions or reviews of exploits_challenges. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-11-19.
  • security researcher assistant
    6 projects | /r/ExploitDev | 19 Nov 2021
    exploit dev usually has its roots in software development and debugging. and essentially your "exploit" is also running inside another process, so if you mess up any existing memory or register, you are going to kill yourself if the process segfault. anyway, there are many resources: a. Protostar: https://github.com/sidchn/Protostar-Exploit-Development-Exercise and many youtubes video associated with these. b. https://github.com/FabioBaroni/awesome-exploit-development c. https://github.com/ihack4falafel/OSCE d. https://github.com/KaoRz/exploits_challenges e. https://github.com/Lazenca/Exploit-tech f. https://github.com/naivenom/exploiting

OSCE

Posts with mentions or reviews of OSCE. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-11-19.
  • security researcher assistant
    6 projects | /r/ExploitDev | 19 Nov 2021
    exploit dev usually has its roots in software development and debugging. and essentially your "exploit" is also running inside another process, so if you mess up any existing memory or register, you are going to kill yourself if the process segfault. anyway, there are many resources: a. Protostar: https://github.com/sidchn/Protostar-Exploit-Development-Exercise and many youtubes video associated with these. b. https://github.com/FabioBaroni/awesome-exploit-development c. https://github.com/ihack4falafel/OSCE d. https://github.com/KaoRz/exploits_challenges e. https://github.com/Lazenca/Exploit-tech f. https://github.com/naivenom/exploiting

What are some alternatives?

When comparing exploits_challenges and OSCE you can also consider the following projects:

Protostar-Exploit-Development-Exercise - My notes for Linux x86 exploit development of the exercises in protostar from exploit education

awesome-exploit-development - A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development

Carilana - Scripts developed for the LiquidBounce script api.

Exploit-tech - Example files to experience basic exploit techniques.

exploiting - Exploiting challenges in Linux and Windows