Loading...
Browse 28 exploit development tools
Hands-on red team training platform with labs, cyber ranges, and CTF assessments.
AI agent platform for automating offensive security operations and evals.
Security research lab publishing vulnerability analyses and exploit research
Python programming training course for cybersecurity professionals
3-day Metasploit training course focused on Ruby scripting & custom modules
5-day instructor-led training on exploit development techniques
Training course for Android and iOS mobile app security testing and exploitation
AI-augmented penetration testing combining automated tools with human expertise
Autonomous web app pentesting platform with exploit validation
Manual vulnerability assessment services with custom exploit development
MCP server enabling AI agents to autonomously run 150+ security tools
VAPT service provider offering manual penetration testing and security assessments
AI-powered automated penetration testing platform for vulnerability discovery
A framework for testing and exploiting race condition vulnerabilities through concurrent request analysis and timing attack automation.
Pwndbg is a GDB plug-in that enhances the debugging experience for low-level software developers, hardware hackers, reverse-engineers, and exploit developers.
A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.
A Windows kernel driver intentionally designed with various vulnerabilities to help security researchers practice kernel exploitation techniques.
Ropper is a multi-architecture binary analysis tool that searches for ROP gadgets and displays information about executable files for exploit development.
A Python library that simplifies format string vulnerability exploitation by providing tools for payload generation, memory manipulation, and automated parameter detection.
Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.
A collection of vulnerable ARM binaries designed for educational exploit development and vulnerability research practice across different architectures and exploitation techniques.
Pwntools is a Python CTF framework and exploit development library that provides tools for rapid prototyping and development of exploits and CTF challenge solutions.
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.
Get strategic cybersecurity insights in your inbox