D4mianWayne / roppy
A Pwning Toolkit
☆29Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for roppy
- Pwning notes☆45Updated 3 months ago
- Scripts I used during CTP☆67Updated 4 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- ☆26Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- ☆45Updated 5 years ago
- ☆14Updated 4 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 4 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆138Updated 3 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆125Updated 4 years ago
- Where CTFs happen☆76Updated 5 months ago
- esoteric☆51Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆102Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- A javascript dll resolver for v8☆11Updated 4 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆178Updated 2 years ago
- Upcoming list of ctfs directly in your terminal!☆16Updated last year
- ☆16Updated 4 years ago
- a repo of links to useful writeups of pwn challenges☆25Updated 6 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆139Updated 3 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆145Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆188Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- Our team's CTF writeups☆11Updated 4 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆49Updated this week