GDB for pwn
☆11Sep 10, 2025Updated 5 months ago
Alternatives and similar repositories for pwngdb
Users that are interested in pwngdb are comparing it to the libraries listed below
Sorting:
- ☆14Sep 26, 2021Updated 4 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 7 months ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- ☆32Aug 10, 2020Updated 5 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Resource utilization monitor for Docker containers & Kubernetes pods that operates with fine granularity and low overhead☆11Dec 25, 2022Updated 3 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- A toolkit to unpack, debug and repack an rpk file.☆12Jan 27, 2021Updated 5 years ago
- Cscope Extension for Code☆13Jan 19, 2026Updated last month
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- CSDN 你🐴炸了☆11Dec 6, 2018Updated 7 years ago
- Use kprobe capture common kernel event and can also use for hids agent(kernel module)☆10Nov 28, 2023Updated 2 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- ctf patching toy☆49Nov 18, 2024Updated last year
- Mac 技巧 - 打造属于你的神兵利器☆10Feb 19, 2016Updated 10 years ago
- afl源码分析☆13Aug 9, 2018Updated 7 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- Simple Scheduler library with no priority and non-preemptive scheduling scheme☆15Mar 17, 2014Updated 11 years ago
- GNURadio For Raspberry Pi On Archlinuxarm☆18Apr 29, 2013Updated 12 years ago
- Inject userland ARM code through PSM☆12Apr 16, 2014Updated 11 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 3 years ago
- Visual Studio Code extension for CodeQuery☆14Jun 16, 2024Updated last year
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆226Jul 2, 2025Updated 8 months ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- ☆135Dec 5, 2025Updated 3 months ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆15Oct 10, 2023Updated 2 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- ☆13Nov 9, 2022Updated 3 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- ☆14Jul 26, 2024Updated last year