152334H / pwnscriptsLinks
Very simple script(s) to hasten binary exploit creation
☆93Updated 4 years ago
Alternatives and similar repositories for pwnscripts
Users that are interested in pwnscripts are comparing it to the libraries listed below
Sorting:
- ☆172Updated 3 years ago
- Where CTFs happen☆82Updated last year
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- A happy heap editor to support your exploitation process☆197Updated 4 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- esoteric☆54Updated 5 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- My write-ups from various CTFs☆117Updated last year
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- A Binary Ninja plugin for vulnerability research.☆296Updated last year
- ☆45Updated last month
- ☆26Updated 3 years ago
- Useful tips by OTA CTF members☆147Updated 6 years ago
- Extra goodies for GEF to (try to) make GDB suck even less☆169Updated 8 months ago
- ☆82Updated 8 years ago
- tools for shellcoding☆58Updated 2 years ago
- Automatic ROPChain Generation☆293Updated 5 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆223Updated 2 years ago
- Kernel development & exploitation practice environment.☆239Updated 2 years ago
- A Pwning Toolkit☆28Updated 9 months ago
- A tool for finding the one gadget RCE in libc☆78Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- Basic pwntools for Windows☆267Updated 2 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- ☆110Updated 5 years ago
- Exploitation and Mitigation Slides☆132Updated last year