ASU-Hacking-Club / pwnbox
Dockerized setup for quick pwning
☆23Updated 3 years ago
Alternatives and similar repositories for pwnbox:
Users that are interested in pwnbox are comparing it to the libraries listed below
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- ☆20Updated 3 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆23Updated 4 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆21Updated 3 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- ☆13Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- a repo of links to useful writeups of pwn challenges☆26Updated 6 years ago
- python and honggfuzz☆25Updated 4 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- My CTF writeups☆25Updated 3 years ago
- Recent Fuzzing Paper☆35Updated last year
- Dockerfiles for (un)popular fuzzers!☆28Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆55Updated this week
- Cross-architecture instruction counting for CTF solving☆45Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- Exploit Firefox Vulnerability☆23Updated 4 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- pwn database☆16Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago
- Fork Free Fail Repeat☆46Updated 3 years ago
- ☆15Updated 8 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago