ASU-Hacking-Club / pwnboxLinks
Dockerized setup for quick pwning
☆23Updated 4 years ago
Alternatives and similar repositories for pwnbox
Users that are interested in pwnbox are comparing it to the libraries listed below
Sorting:
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆70Updated 4 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 9 months ago
- ☆21Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Launch radare2 like a boss from pwntools in tmux☆24Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 6 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- tools for shellcoding☆58Updated 2 years ago
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- A tool for finding the one gadget RCE in libc☆78Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆72Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Official training ground for the OTA CTF team☆39Updated 3 years ago
- A library for patching ELFs☆57Updated 5 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆113Updated 6 years ago
- ☆89Updated 3 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- ☆86Updated 2 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last month
- various CTF writeups☆61Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 4 years ago
- Exploitation and Mitigation Slides☆132Updated last year
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- An interactive memory info for pwning / exploiting☆100Updated 2 years ago