ChrisTheCoolHut / ZeratoolLinks
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
☆1,142Updated 2 years ago
Alternatives and similar repositories for Zeratool
Users that are interested in Zeratool are comparing it to the libraries listed below
Sorting:
- Build a database of libc offsets to simplify exploitation☆1,832Updated last year
- ☆720Updated last month
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆819Updated 4 years ago
- For Linux binary Exploitation☆836Updated 7 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆542Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,475Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,810Updated 6 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,245Updated 3 weeks ago
- Provide powerful tools for seccomp analysis☆1,073Updated 3 weeks ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,046Updated 7 months ago
- A docker environment for pwn in ctf☆783Updated last month
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆841Updated 5 years ago
- pwninit - automate starting binary exploit challenges☆1,008Updated last year
- ☆1,064Updated last year
- Perfect Blue's CTF Writeups☆687Updated last year
- gdb for pwn☆952Updated last month
- A collection of pwn/CTF related utilities for Ghidra☆694Updated last year
- An archive of low-level CTF challenges developed over the years☆642Updated 3 years ago
- A colleciton of CTF write-ups all using pwntools☆518Updated 9 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆697Updated 4 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆651Updated 3 months ago
- Script for searching the extracted firmware file system for goodies!☆1,169Updated 2 years ago
- How to build an efficient pwn development environment in 2020☆266Updated 4 years ago
- Documentation for the angr suite☆845Updated 2 years ago
- 💖CTF pwn framework.☆342Updated 3 years ago
- CTF write-ups by Plaid Parliament of Pwning☆799Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,270Updated 6 months ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆223Updated 2 years ago