Manage building and deploying exploitation challenges with ease
☆59Oct 26, 2025Updated 4 months ago
Alternatives and similar repositories for PwnableHarness
Users that are interested in PwnableHarness are comparing it to the libraries listed below
Sorting:
- Configs for NECCDC 2017☆16Mar 22, 2017Updated 8 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 9 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- Webinterface to execute and see the output of shellbased webscanning software, but honestly would work with every shell program.☆12Apr 9, 2019Updated 6 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆17Jan 29, 2019Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Capture The Flag Marker System☆18Oct 21, 2018Updated 7 years ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- Track your beacons in a redteam scoreboard☆16Oct 28, 2020Updated 5 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- QUIC tunnel☆15Oct 28, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago