☆19Apr 30, 2018Updated 7 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below
Sorting:
- ☆11May 28, 2019Updated 6 years ago
- A Qt and C++ GUI for radare2 reverse engineering framework☆12Oct 13, 2017Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Toy project for static analysis of ELF binaries☆29Jun 24, 2017Updated 8 years ago
- ☆14May 8, 2017Updated 8 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- ☆16Sep 26, 2019Updated 6 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Crash macOS and iOS devices with one packet☆48Nov 15, 2018Updated 7 years ago
- A collection of pwn execrise☆28Oct 31, 2019Updated 6 years ago
- Reverse TCP Python Framework☆25Nov 7, 2017Updated 8 years ago
- A VM for RE and Pwn☆25May 17, 2024Updated last year
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- Port of Google V8 JavaScript engine to z/OS. The Linux on Z port is maintained in the community: https://chromium.googlesource.com/v8/v8…☆43Feb 20, 2020Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Winhttpclient is an interface which packaged with WinHTTP API written in c.☆13Jan 22, 2023Updated 3 years ago
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- Repository for Endpoint Security Testing☆35Jul 26, 2018Updated 7 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Python Data Audit☆12Jul 24, 2020Updated 5 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Review everyday☆14May 30, 2020Updated 5 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- Virtual service to help secure IoT devices☆12Aug 17, 2017Updated 8 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago