A VM for RE and Pwn
☆25May 15, 2026Updated this week
Alternatives and similar repositories for PwnBox
Users that are interested in PwnBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Ghidra extension to disassemble NSIS installers☆25Sep 8, 2025Updated 8 months ago
- A fast generative fuzzer for HTTP☆17Nov 29, 2018Updated 7 years ago
- unbox - Unpack and Decompile the $h*! out of things☆48Mar 28, 2018Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Some of the competition seen in the CS Games 2017☆19Mar 30, 2017Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- A series of guides on how to setup devices that are Arm SystemReady certified and their firmware.☆15Feb 25, 2022Updated 4 years ago
- The NandBug Software☆13May 23, 2020Updated 5 years ago
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- My conference presentations and Materials for them.☆33Aug 29, 2022Updated 3 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- Software from the NorthSec badge☆58Jul 18, 2025Updated 10 months ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- My personal (static) feed aggregator for reddit and hackernews written in Javascript.☆11Jun 6, 2022Updated 3 years ago
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Web Exploitation Workflow for CTF Challenges☆54Dec 11, 2016Updated 9 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- ☆14Jun 2, 2025Updated 11 months ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- ☆19Apr 30, 2018Updated 8 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 4 years ago
- JavaScript simulation of the classical XY model☆14Sep 12, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A debbuger based dbgeng for WIndows☆34Aug 23, 2017Updated 8 years ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 5 months ago
- Fuzzing Infrastructure with k8s & cephfs☆12Jul 23, 2020Updated 5 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- This software allows you to perform a deauth attack with an ESP8266 against selected networks. The ESP8266 is a cheap and easy to use Wi-…☆10Sep 28, 2023Updated 2 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago