D1ag0n-Young / gdb321View external linksLinks
pwndbg、pwn-peda、pwn-gef和Pwngdb四合一,一合四,通过命令gdb-peda、gdb-pwndbg、gdb-peda轻松切换gdb插件
☆39Oct 23, 2023Updated 2 years ago
Alternatives and similar repositories for gdb321
Users that are interested in gdb321 are comparing it to the libraries listed below
Sorting:
- AWD 自动化攻击框架☆10Jun 21, 2019Updated 6 years ago
- 用于自动化检测CTF中常出现得工具图片隐写题目☆10Feb 6, 2021Updated 5 years ago
- thinkphp5 RCE auto exploit☆11Jun 19, 2019Updated 6 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- 一款碾压sqlmap的sql注入漏洞检测系统^^☆16Jan 1, 2021Updated 5 years ago
- 端口扫描☆19Aug 23, 2019Updated 6 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- 移动端App安全测试MCP工具集 - 基于Frida、ADB、JADX的完整移动应用安全分析平台☆54Aug 27, 2025Updated 5 months ago
- Nu1L战队《从0到1》docker环境☆24Sep 21, 2020Updated 5 years ago
- ☆101Jan 29, 2026Updated 2 weeks ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆65Apr 3, 2022Updated 3 years ago
- Vulnerability information query tool on the terminal.☆64Aug 20, 2021Updated 4 years ago
- Some script and useful tool for Attack & Defense CTF☆29Jun 27, 2018Updated 7 years ago
- 代码审计工具,用于监听mysql日志,支持mysql8.0以上和以下的版本。☆34Nov 11, 2021Updated 4 years ago
- Firefox and Chorme Hackbar 2.3.1☆32Jul 28, 2020Updated 5 years ago
- A tool to initialize pwn game exploit enviroment.☆43Nov 27, 2025Updated 2 months ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆18Mar 25, 2025Updated 10 months ago
- 利用python3写的综合扫描工具,可“一键”实现基本信息收集(端口、敏感目录、WAF、服务、操作系统、子域名),支持POC扫描(可自行添加POC,操作简单),支持利用AWVS探测(需使用API接口),未来争取实现xray联动。☆37Oct 19, 2020Updated 5 years ago
- Index of CTFHub Base Images☆84May 12, 2020Updated 5 years ago
- ☆10Nov 18, 2023Updated 2 years ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated last month
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Java RMI反序列化漏洞插件☆49Jun 11, 2021Updated 4 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Docker file for pwn env. (ubuntu16.04/18.04/18.10)☆10Aug 19, 2021Updated 4 years ago
- 安卓逆向相关的一些二进制工具 / Some bin utils for android reverse engineer☆13Apr 28, 2020Updated 5 years ago
- ☆13Jun 27, 2022Updated 3 years ago
- 当今海量的移动应用跟人们的生活、工作、学习、休闲、娱乐等方面密切相关,发挥着重要作用。多数APP在安装、更新时,都会向用户申请相关手机权限。多数终端用户缺乏鉴别APP所请求的权限是否合理的能力,并且APP安装使用过程中过度索要权限现象较为普遍,这就给用户数据安全、隐私信息泄…☆13Feb 11, 2020Updated 6 years ago
- opencv 识别滑动验证缺口位置☆10Mar 16, 2020Updated 5 years ago
- A google dork parser that bypasses captcha's automatically.☆17Jul 15, 2025Updated 7 months ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- Webapp builder: The easy (and fast) way to create a web project☆13Jul 3, 2017Updated 8 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- BakaXL的Minecraft启动核心,采用Rust编写☆10Jun 21, 2023Updated 2 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago