Manage building and deploying exploitation challenges with ease
☆59Oct 26, 2025Updated 5 months ago
Alternatives and similar repositories for PwnableHarness
Users that are interested in PwnableHarness are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 11 years ago
- Configs for NECCDC 2017☆16Mar 22, 2017Updated 9 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Notes and utilities for reverse engineering ASMedia xHC (USB 3.x) Host Controllers.☆30Sep 26, 2025Updated 6 months ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last week
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Listens to events provide by the Mitel 3300 ACD Realtime TCP Stream☆10Jun 28, 2015Updated 10 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- Hack the Orbit interactive CTF workshop files 🛰️☆20Nov 15, 2024Updated last year
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 12 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- Connector to allow discovery of servers (CLI version)☆11Oct 1, 2020Updated 5 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆20Feb 28, 2018Updated 8 years ago
- ☆16May 6, 2015Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Extract the Data Table of a Vita RCO file☆11Jan 3, 2016Updated 10 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆18Jan 29, 2019Updated 7 years ago
- ☆56Aug 26, 2022Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆43Aug 6, 2025Updated 8 months ago
- ☆28Apr 1, 2018Updated 8 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 10 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- debugDescription☆11Sep 9, 2015Updated 10 years ago
- ☆18Jul 3, 2020Updated 5 years ago