Exploit-Challenges is a collection of vulnerable ARM binaries designed for educational purposes in vulnerability research and exploit development. The collection includes multiple challenge levels targeting different exploitation techniques and architectures. The ARM 32-bit challenges cover Return Oriented Programming (ROP) fundamentals through seven progressive levels. These range from basic ROP introduction to advanced techniques including ASLR bypass, format string vulnerabilities, stack pivoting, and off-by-one vulnerabilities. The heap-based challenges focus on common memory corruption issues including heap overflow, Use-After-Free, and double free vulnerabilities. ARM 64-bit challenges provide 64-bit versions of select ROP exercises, allowing practitioners to understand architectural differences in exploitation techniques. All binaries are built as ARMv7 Mach-O executables and are designed for use on 32-bit jailbroken iOS devices with debugging utilities like radare2. The challenges include accompanying write-ups and explanations available through the creator's educational content.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
SharpPrinter enables efficient discovery of network printers for security and management purposes.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.