A VM for RE and Pwn
☆25May 17, 2024Updated last year
Alternatives and similar repositories for PwnBox
Users that are interested in PwnBox are comparing it to the libraries listed below
Sorting:
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14May 17, 2025Updated 10 months ago
- Ghidra extension to disassemble NSIS installers☆25Sep 8, 2025Updated 6 months ago
- unbox - Unpack and Decompile the $h*! out of things☆48Mar 28, 2018Updated 7 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- The code behind https://dns-api.org/☆31Jul 28, 2021Updated 4 years ago
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- Simple script to get your private/public or both programs using the Hackerone graphql.☆22Jan 24, 2020Updated 6 years ago
- Some of the competition seen in the CS Games 2017☆19Mar 30, 2017Updated 8 years ago
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- A series of guides on how to setup devices that are Arm SystemReady certified and their firmware.☆15Feb 25, 2022Updated 4 years ago
- The NandBug Software☆13May 23, 2020Updated 5 years ago
- Dépôt relatif aux tâches organisationnelles et aux idées proposées pour JDIS☆11Aug 18, 2021Updated 4 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- My conference presentations and Materials for them.☆33Aug 29, 2022Updated 3 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- Software from the NorthSec badge☆58Jul 18, 2025Updated 8 months ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- GDB cheatsheet for reversing binaries☆21Jan 25, 2019Updated 7 years ago
- ☆26Jun 3, 2016Updated 9 years ago
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- Fork of the Blaze library for compatibility with Blaze CUDA · https://bitbucket.org/blaze-lib/blaze · https://github.com/STEllAR-GROUP/bl…☆10Oct 17, 2019Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Adaption of the r2ghidra-dec product to lift binaries to LLVM IR☆13Apr 14, 2021Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Web Exploitation Workflow for CTF Challenges☆54Dec 11, 2016Updated 9 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Runtime tracer for the vb6 virtual machine☆54Jan 24, 2018Updated 8 years ago
- JavaScript simulation of the classical XY model☆14Sep 12, 2013Updated 12 years ago
- Sourcegraph workflow for Alfred☆15Jun 24, 2016Updated 9 years ago
- A debbuger based dbgeng for WIndows☆34Aug 23, 2017Updated 8 years ago
- Async / concurrent HTTP requests for Go☆50Jun 29, 2023Updated 2 years ago
- Fuzzing Infrastructure with k8s & cephfs☆12Jul 23, 2020Updated 5 years ago
- ☆15May 15, 2025Updated 10 months ago