1ikeadragon / pwntainerLinks
Docker container with all required CTF tools.
☆60Updated last year
Alternatives and similar repositories for pwntainer
Users that are interested in pwntainer are comparing it to the libraries listed below
Sorting:
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆172Updated 10 months ago
- ☆251Updated 3 months ago
- Source code for the DEF CON 32 CTF Qualifiers.☆75Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆81Updated 4 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆232Updated 10 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆125Updated 2 years ago
- A bunch of v8 resources (with a security focus)☆63Updated last week
- Collection of browser challenges☆138Updated 4 years ago
- Write-ups for various CTF☆200Updated 2 months ago
- Linux kernel privilege escalation techniques☆146Updated last year
- MCP for Pwn☆145Updated last week
- Source code for the DEF CON 33 CTF Qualifiers.☆53Updated 2 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- ☆36Updated last year
- ☆89Updated 2 months ago
- a new class of file structure attacks☆56Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆60Updated 2 weeks ago
- Source code for the DEF CON 30 CTF Qualifiers.☆266Updated last year
- Infrastructure for the Potluck CTF☆25Updated last year
- A GDB+GEF-style debugger for unloading Python pickles☆68Updated 4 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆197Updated 5 months ago
- CTF write-ups by Maple Mallard Magistrates☆44Updated 11 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆89Updated 3 weeks ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆93Updated last week
- Python sandbox escape wiki + payload generator☆130Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated this week
- Challenges and writeups from SamsungCTF☆97Updated 2 years ago
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆51Updated 3 weeks ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆238Updated last year
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆62Updated this week