Learn Binary Exploitation with sample problems and solutions
☆175Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for LearnPwn
Users that are interested in LearnPwn are comparing it to the libraries listed below
Sorting:
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆806Nov 18, 2025Updated 3 months ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆40Jan 7, 2021Updated 5 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- ☆51Jun 24, 2016Updated 9 years ago
- Kumpulan writeup dari lomba lomba CTF dan juga soalnya (kalau ada)☆13May 2, 2023Updated 2 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Very simple script(s) to hasten binary exploit creation☆93May 27, 2021Updated 4 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆13May 31, 2019Updated 6 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆64Feb 5, 2026Updated last month
- A simple pickle assembler to make handcrafting pickle bytecode easier.☆15Apr 16, 2021Updated 4 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Mar 8, 2024Updated last year
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- TCP1P CTF writeup☆32May 23, 2023Updated 2 years ago
- Repository of CTF challenges for The Cyber Jawara International 2024☆19Oct 28, 2024Updated last year
- The ExploitToolFinder Utility [by exploitsecurity.io] assists security researchers in their quest to find the right tool for the job☆17Jun 21, 2023Updated 2 years ago
- An autograder base Docker image for Gradescope with improved security☆20Apr 8, 2023Updated 2 years ago
- ☆22Feb 3, 2026Updated last month
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆112Feb 22, 2022Updated 4 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- RE / Binary Exploitation Resources☆73Dec 1, 2017Updated 8 years ago
- A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩☆728Jan 27, 2026Updated last month
- Automatic tool to quickly start a pwn CTF challenge☆45Nov 3, 2023Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- This is an unofficial mirror of https://gitee.com/geekneo/A64Dbg☆18Jun 12, 2025Updated 8 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- Udemy – Linux Heap Exploitation☆54Jun 14, 2021Updated 4 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- TLS & SNI aware netcat☆49Oct 23, 2024Updated last year