exploit_me
A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.

exploit_me
A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.
exploit_me Description
exploit_me is a deliberately vulnerable ARM/ARM64 (AARCH64) application designed for educational purposes and exploitation training. The tool provides a CTF-style learning environment with 14 different vulnerability levels that demonstrate common security flaws found in real-world applications. The application includes various types of vulnerabilities such as: - Buffer overflows (stack, array, heap) - Integer overflow and off-by-one errors - Format string vulnerabilities - Memory corruption issues (use-after-free, zero pointers) - Code execution techniques (ROP, JOP) - Injection vulnerabilities (command injection, path traversal) - Advanced exploitation concepts (structure redirection, type confusion) The tool is portable across different platforms and includes setup scripts for Debian/Ubuntu systems. It provides both 32-bit and 64-bit binaries for testing different exploitation scenarios. The application comes with hints and debugging utilities to assist users in learning exploitation techniques. exploit_me serves as a hands-on training platform for security professionals, researchers, and students to practice binary exploitation skills in a controlled environment.
exploit_me FAQ
Common questions about exploit_me including features, pricing, alternatives, and user reviews.
exploit_me is A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.. It is a Security Operations solution designed to help security teams with CTF, Training, Education.
FEATURED
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
Weekly cybersecurity newsletter for security leaders and professionals