exploit_me is a deliberately vulnerable ARM/ARM64 (AARCH64) application designed for educational purposes and exploitation training. The tool provides a CTF-style learning environment with 14 different vulnerability levels that demonstrate common security flaws found in real-world applications. The application includes various types of vulnerabilities such as: - Buffer overflows (stack, array, heap) - Integer overflow and off-by-one errors - Format string vulnerabilities - Memory corruption issues (use-after-free, zero pointers) - Code execution techniques (ROP, JOP) - Injection vulnerabilities (command injection, path traversal) - Advanced exploitation concepts (structure redirection, type confusion) The tool is portable across different platforms and includes setup scripts for Debian/Ubuntu systems. It provides both 32-bit and 64-bit binaries for testing different exploitation scenarios. The application comes with hints and debugging utilities to assist users in learning exploitation techniques. exploit_me serves as a hands-on training platform for security professionals, researchers, and students to practice binary exploitation skills in a controlled environment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A digital archive of the internet, allowing users to capture and browse archived web pages.
AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
SharpPrinter enables efficient discovery of network printers for security and management purposes.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
A suite of tools for Wi-Fi network security assessment and penetration testing.
Interactive online malware sandbox for real-time analysis and threat intelligence
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.