pwndbg、pwn-peda、pwn-gef和Pwngdb四合一,一合四,通过命令gdb-peda、gdb-pwndbg、gdb-peda轻松切换gdb插件
☆39Oct 23, 2023Updated 2 years ago
Alternatives and similar repositories for gdb321
Users that are interested in gdb321 are comparing it to the libraries listed below
Sorting:
- 用于自动化检测CTF中常出现得工具图片隐写题目☆10Feb 6, 2021Updated 5 years ago
- AWD 自动化攻击框架☆10Jun 21, 2019Updated 6 years ago
- thinkphp5 RCE auto exploit☆11Jun 19, 2019Updated 6 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- 一款碾压sqlmap的sql注入漏洞检测系统^^☆16Jan 1, 2021Updated 5 years ago
- 端口扫描☆19Aug 23, 2019Updated 6 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- Nu1L战队《从0到1》docker环境☆24Sep 21, 2020Updated 5 years ago
- 移动端App安全测试MCP工具集 - 基于ADB、aapt、JADX的完整移动应用安全分析平台☆56Updated this week
- Vulnerability information query tool on the terminal.☆64Aug 20, 2021Updated 4 years ago
- Some script and useful tool for Attack & Defense CTF☆29Jun 27, 2018Updated 7 years ago
- Firefox and Chorme Hackbar 2.3.1☆33Jul 28, 2020Updated 5 years ago
- 一个LDAP请求监听器,摆脱dnslog平台和java☆34Feb 4, 2023Updated 3 years ago
- 代码审计工具,用于监听mysql日志,支持mysql8.0以上和以下的版本。☆34Nov 11, 2021Updated 4 years ago
- ☆113Jan 29, 2026Updated last month
- 利用python3写的综合扫描工具,可“一键”实现基本信息收集(端口、敏感目录、WAF、服务、操作系统、子域名),支持POC扫描(可自行添加POC,操作简单),支持利用AWVS探测(需使用API接口),未来争取实现xray联动。☆37Oct 19, 2020Updated 5 years ago
- Index of CTFHub Base Images☆84May 12, 2020Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆23Mar 25, 2025Updated 11 months ago
- ☆11Nov 18, 2023Updated 2 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- glibc offset search for ctf.☆787Feb 18, 2023Updated 3 years ago
- Parser library for 8SVX: digitally sampled audio voices consisting of 8-bit samples☆12Mar 2, 2024Updated 2 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- ☆12Nov 17, 2024Updated last year
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- RSS migrator for Hexo.☆11Jul 29, 2023Updated 2 years ago
- ☆18Aug 15, 2025Updated 6 months ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- 漏洞poc仓库☆38Jul 17, 2022Updated 3 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆50Mar 26, 2019Updated 6 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago