Dockerized setup for quick pwning
☆23Mar 2, 2021Updated 5 years ago
Alternatives and similar repositories for pwnbox
Users that are interested in pwnbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pwn database☆18Jan 6, 2019Updated 7 years ago
- NixOS and friends☆12Updated this week
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- An authentication termination SSH proxy.☆13Sep 8, 2023Updated 2 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- ETL for moving Ethereum data to Neo4j database☆20Mar 30, 2020Updated 5 years ago
- ☆20Dec 23, 2019Updated 6 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- Code Hierarchy Exploration Net (chen)☆27Mar 9, 2026Updated 2 weeks ago
- A program used to communicate with iBoot / iBSS using the libusb-1.0 api.☆16Aug 15, 2010Updated 15 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Some Snippets for Frida☆15Feb 27, 2021Updated 5 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Apr 24, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆63Apr 27, 2021Updated 4 years ago
- ☆89Jun 3, 2018Updated 7 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- pure-Java original VNC client☆10Oct 6, 2019Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Wireshark dissector for the Nix daemon protocol.☆14Sep 11, 2025Updated 6 months ago
- ☆11Feb 20, 2015Updated 11 years ago
- Ghidra extension to disassemble NSIS installers☆25Sep 8, 2025Updated 6 months ago
- ☆17Dec 1, 2020Updated 5 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- A demo site for the jekyll-theme-console theme.☆18Oct 6, 2022Updated 3 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Challenges where you can practice heap tecnics☆24Nov 18, 2017Updated 8 years ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- ☆10Jun 2, 2021Updated 4 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago