1ikeadragon / pwntainerView external linksLinks
Docker container with all required CTF tools.
☆60Jul 24, 2024Updated last year
Alternatives and similar repositories for pwntainer
Users that are interested in pwntainer are comparing it to the libraries listed below
Sorting:
- ☆15Jul 25, 2025Updated 6 months ago
- ☆13Jan 22, 2026Updated 3 weeks ago
- ☆31Sep 21, 2025Updated 4 months ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A Python Package For Reverse Engineering.☆28Jan 19, 2025Updated last year
- ☆20Apr 10, 2025Updated 10 months ago
- in preparation for the pyjail club☆62Dec 9, 2025Updated 2 months ago
- Pwn 比赛小工具☆32Dec 27, 2025Updated last month
- A domain-specific language for prompt engineering☆30Feb 19, 2025Updated 11 months ago
- ☆23Feb 2, 2026Updated last week
- Process Orchestration Framework: A camunda 7 fork☆20Updated this week
- A customized debug tool☆21Nov 20, 2024Updated last year
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Dec 18, 2023Updated 2 years ago
- AWD☆25Aug 22, 2023Updated 2 years ago
- ☆57Jun 22, 2021Updated 4 years ago
- Some common reverse exps in CTF.自己总结编写的一些逆向常用脚本&&常见加密/编码的实现源码和 比赛时用的处理脚本。☆34Jan 9, 2024Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆37Nov 16, 2025Updated 3 months ago
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆64Dec 28, 2025Updated last month
- ☆35Jan 27, 2025Updated last year
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- Muti-threading version of Finger☆32Apr 8, 2024Updated last year
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Jan 27, 2026Updated 2 weeks ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- ☆91Oct 23, 2025Updated 3 months ago
- ☆10Mar 8, 2024Updated last year
- Expelee offers comprehensive code reviews for teams that are preparing to launch their blockchain applications. We scan for security vuln…☆10Jan 25, 2026Updated 3 weeks ago
- ☆14Jan 27, 2026Updated 2 weeks ago
- You can use it to modify HTTP (S) response values, redirect static file requests to the local file directory, and support batch modificat…☆18Nov 30, 2022Updated 3 years ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆175Jan 1, 2025Updated last year
- GUI Maze Solver for ASCII Maze in CTF☆52Jul 29, 2025Updated 6 months ago
- Resources for security engineer job search.☆10Jan 25, 2026Updated 3 weeks ago
- Rapid Response sample Foundry app☆14Updated this week
- A Grand Sumo prediction game☆10Updated this week
- Public security reports☆16Dec 6, 2024Updated last year
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- ☆14Mar 10, 2025Updated 11 months ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago