ChrisTheCoolHut / Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
☆1,124Updated last year
Alternatives and similar repositories for Zeratool:
Users that are interested in Zeratool are comparing it to the libraries listed below
- Build a database of libc offsets to simplify exploitation☆1,752Updated 5 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,928Updated 3 weeks ago
- ☆655Updated last month
- The best tool for finding one gadget RCE in libc.so.6☆2,139Updated this week
- Using Intel's PIN tool to solve CTF problems☆497Updated 4 years ago
- A collection of pwn/CTF related utilities for Ghidra☆667Updated 6 months ago
- ☆1,013Updated last year
- An updated collection of resources targeting browser-exploitation.☆814Updated 4 years ago
- pwninit - automate starting binary exploit challenges☆922Updated 7 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,764Updated 5 years ago
- Provide powerful tools for seccomp analysis☆1,023Updated this week
- gdb for pwn☆911Updated 7 months ago
- A colleciton of CTF write-ups all using pwntools☆509Updated 8 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆643Updated last month
- For Linux binary Exploitation☆829Updated 6 years ago
- An archive of low-level CTF challenges developed over the years☆625Updated 3 years ago
- Perfect Blue's CTF Writeups☆673Updated 9 months ago
- A collection of links related to VMware escape exploits☆1,410Updated 6 months ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆727Updated 3 months ago
- cwe_checker finds vulnerable patterns in binary executables☆1,197Updated 3 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,895Updated last month
- The Damn Vulnerable Router Firmware Project☆683Updated 3 years ago
- Script for searching the extracted firmware file system for goodies!☆1,108Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆817Updated 4 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆529Updated 3 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆745Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,177Updated this week
- CTF write-ups by Plaid Parliament of Pwning☆782Updated 9 months ago
- How to build an efficient pwn development environment in 2020☆260Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,444Updated 5 months ago