A VM for RE and Pwn
☆25May 17, 2024Updated last year
Alternatives and similar repositories for PwnBox
Users that are interested in PwnBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14May 17, 2025Updated 10 months ago
- ☆12Sep 25, 2016Updated 9 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ListACS is an ACS disassembler that supports ZDoom's ACS extensions. It can also attempt to decompile scripts into ACS source code.☆14Jul 22, 2020Updated 5 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- A series of guides on how to setup devices that are Arm SystemReady certified and their firmware.☆15Feb 25, 2022Updated 4 years ago
- The NandBug Software☆13May 23, 2020Updated 5 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- My conference presentations and Materials for them.☆33Aug 29, 2022Updated 3 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- GDB cheatsheet for reversing binaries☆21Jan 25, 2019Updated 7 years ago
- ☆26Jun 3, 2016Updated 9 years ago
- Fork of the Blaze library for compatibility with Blaze CUDA · https://bitbucket.org/blaze-lib/blaze · https://github.com/STEllAR-GROUP/bl…☆10Oct 17, 2019Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- ☆14Jun 2, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- ☆18Apr 20, 2021Updated 4 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- Runtime tracer for the vb6 virtual machine☆54Jan 24, 2018Updated 8 years ago
- An emulator for Ricoh 2A03-based systems! Runs in the browser and natively on desktop.☆33Jan 31, 2026Updated 2 months ago
- A debbuger based dbgeng for WIndows☆34Aug 23, 2017Updated 8 years ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 4 months ago
- Async / concurrent HTTP requests for Go☆50Jun 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Fuzzing Infrastructure with k8s & cephfs☆12Jul 23, 2020Updated 5 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- This project is a modification of Openra1n to fully boot jailbreak on iOS 15 - 16.5.1 . with the help of Palera1n's code, this project no…☆12Jul 27, 2023Updated 2 years ago
- ☆15Updated this week
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- This software allows you to perform a deauth attack with an ESP8266 against selected networks. The ESP8266 is a cheap and easy to use Wi-…☆10Sep 28, 2023Updated 2 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago