A Pwning Toolkit
☆28Jan 11, 2025Updated last year
Alternatives and similar repositories for roppy
Users that are interested in roppy are comparing it to the libraries listed below
Sorting:
- Knowledge Base of Exploitation Techniques☆60Apr 30, 2025Updated 10 months ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- Proof Of Concepts☆55Jan 4, 2026Updated 2 months ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Notes for efficient and easier engagements - notes over time☆24Apr 1, 2021Updated 4 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- General Scripts to help with various types of SQL Injection☆30Jan 31, 2014Updated 12 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- An AI security awesome list / learning journey☆100Feb 19, 2026Updated 2 weeks ago
- A Python3-compatible fork of the Cryptanalib module from FeatherDuster.☆11Nov 27, 2025Updated 3 months ago
- ☆11Apr 30, 2021Updated 4 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Web UI for converting conveniently an image to ASCII art using multiple approaches☆14Feb 11, 2026Updated 3 weeks ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 4 months ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- A python script to automatically generate shellcode payload from assembly files.☆13Nov 13, 2022Updated 3 years ago
- ☆13Aug 28, 2014Updated 11 years ago
- A library to interface with the WACCA Console, WIP, use at your own risk.☆14Feb 10, 2026Updated 3 weeks ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 11 months ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- ☆16Updated this week
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Scrape your Foodpanda and Deliveroo orders☆10May 30, 2018Updated 7 years ago
- Implement CollAFL using LLVM LTO pass on afl++.☆12Sep 24, 2020Updated 5 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Snake on the Dreamcast memory card peripheral device☆14Jan 13, 2023Updated 3 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated last month
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago