Manage building and deploying exploitation challenges with ease
☆59Oct 26, 2025Updated 6 months ago
Alternatives and similar repositories for PwnableHarness
Users that are interested in PwnableHarness are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- A port of the ever popular Galacticraft mod to Minecraft PE :)☆15Dec 3, 2015Updated 10 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 9 years ago
- Configs for NECCDC 2017☆16Mar 22, 2017Updated 9 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Listens to events provide by the Mitel 3300 ACD Realtime TCP Stream☆10Jun 28, 2015Updated 10 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆39Oct 19, 2017Updated 8 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 12 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- a list of web browser vulnerabilities☆20May 10, 2020Updated 6 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 7 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Extract the Data Table of a Vita RCO file☆12Jan 3, 2016Updated 10 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆18Jan 29, 2019Updated 7 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Adds The End dimension to Minecraft PE. Work in progress.☆20Jun 23, 2016Updated 9 years ago
- ☆55Aug 26, 2022Updated 3 years ago
- icloud bypass developed by s1a73r5☆11Dec 30, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Documentation generator for the Go programming language☆11Apr 21, 2011Updated 15 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- My articles☆16May 24, 2011Updated 14 years ago
- Rust refactoring project☆20Nov 7, 2016Updated 9 years ago
- ☆29Aug 10, 2019Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Bypass iOS PIN Passcode☆10May 16, 2014Updated 12 years ago