Corb3nik / PwnBoxLinks
A VM for RE and Pwn
☆25Updated last year
Alternatives and similar repositories for PwnBox
Users that are interested in PwnBox are comparing it to the libraries listed below
Sorting:
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆21Updated 6 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆44Updated 7 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- All challenges I created for CTF☆12Updated 3 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Updated 8 years ago
- various CTF writeups☆60Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆34Updated 11 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- exploit development☆49Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆34Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago