exploits_challenges
Challenges and vulnerabilities exploitation. (by KaoRz)
OSCE
Collection of things made during my preparation to take on OSCE (by ihack4falafel)
Our great sponsors
exploits_challenges | OSCE | |
---|---|---|
1 | 1 | |
59 | 186 | |
- | - | |
0.0 | 0.0 | |
over 3 years ago | about 2 years ago | |
Python | Python | |
- | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
exploits_challenges
Posts with mentions or reviews of exploits_challenges.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-11-19.
-
security researcher assistant
exploit dev usually has its roots in software development and debugging. and essentially your "exploit" is also running inside another process, so if you mess up any existing memory or register, you are going to kill yourself if the process segfault. anyway, there are many resources: a. Protostar: https://github.com/sidchn/Protostar-Exploit-Development-Exercise and many youtubes video associated with these. b. https://github.com/FabioBaroni/awesome-exploit-development c. https://github.com/ihack4falafel/OSCE d. https://github.com/KaoRz/exploits_challenges e. https://github.com/Lazenca/Exploit-tech f. https://github.com/naivenom/exploiting
OSCE
Posts with mentions or reviews of OSCE.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-11-19.
-
security researcher assistant
exploit dev usually has its roots in software development and debugging. and essentially your "exploit" is also running inside another process, so if you mess up any existing memory or register, you are going to kill yourself if the process segfault. anyway, there are many resources: a. Protostar: https://github.com/sidchn/Protostar-Exploit-Development-Exercise and many youtubes video associated with these. b. https://github.com/FabioBaroni/awesome-exploit-development c. https://github.com/ihack4falafel/OSCE d. https://github.com/KaoRz/exploits_challenges e. https://github.com/Lazenca/Exploit-tech f. https://github.com/naivenom/exploiting
What are some alternatives?
When comparing exploits_challenges and OSCE you can also consider the following projects:
Protostar-Exploit-Development-Exercise - My notes for Linux x86 exploit development of the exercises in protostar from exploit education
awesome-exploit-development - A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
Carilana - Scripts developed for the LiquidBounce script api.
Exploit-tech - Example files to experience basic exploit techniques.
exploiting - Exploiting challenges in Linux and Windows