
A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.

A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.
exploit_me is a deliberately vulnerable ARM/ARM64 (AARCH64) application designed for educational purposes and exploitation training. The tool provides a CTF-style learning environment with 14 different vulnerability levels that demonstrate common security flaws found in real-world applications. The application includes various types of vulnerabilities such as: - Buffer overflows (stack, array, heap) - Integer overflow and off-by-one errors - Format string vulnerabilities - Memory corruption issues (use-after-free, zero pointers) - Code execution techniques (ROP, JOP) - Injection vulnerabilities (command injection, path traversal) - Advanced exploitation concepts (structure redirection, type confusion) The tool is portable across different platforms and includes setup scripts for Debian/Ubuntu systems. It provides both 32-bit and 64-bit binaries for testing different exploitation scenarios. The application comes with hints and debugging utilities to assist users in learning exploitation techniques. exploit_me serves as a hands-on training platform for security professionals, researchers, and students to practice binary exploitation skills in a controlled environment.
Common questions about exploit_me including features, pricing, alternatives, and user reviews.
exploit_me is A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education. It is a Security Operations solution designed to help security teams with CTF, Education, Vulnerability.
exploit_me is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/bkerler/exploit_me/ for download and installation instructions.
Popular alternatives to exploit_me include:
Compare all exploit_me alternatives at https://cybersectools.com/alternatives/exploitme
exploit_me is for security teams and organizations that need CTF, Education, Vulnerability, ARM, ROP. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
A collection of vulnerable ARM binaries designed for educational exploit development and vulnerability research practice across different architectures and exploitation techniques.
Haaukins is an automated virtualization platform that provides hands-on cybersecurity education through capture the flag exercises in controlled vulnerable environments.
A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.