Diego-AltF4 / PwnCtfTool
☆14Updated 3 years ago
Alternatives and similar repositories for PwnCtfTool:
Users that are interested in PwnCtfTool are comparing it to the libraries listed below
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆45Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- ☆50Updated 6 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆167Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated 3 weeks ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- Memory mapping profiles for forensic analysis using volatility 3☆26Updated 3 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Updated 3 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- Signatus - Vulnerable TCP C++ server to practice Win 32 exploitation.☆47Updated 3 years ago
- Pre-compiled builds for CVE-2021-4034☆25Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆39Updated last year
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- An automatic Blind ROP exploitation tool☆201Updated last year
- vulnerable windows binaries for exploitation practice☆40Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Github repository which contains a functional exploit for CVE-2021-39165☆21Updated 2 years ago
- ☆105Updated 9 months ago
- A comprehensive Hypervisor resources repo☆106Updated 2 months ago
- ☆178Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆152Updated 5 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆84Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Slides and videos from my public speeches / conferences☆74Updated 2 weeks ago
- Automate converting webshells into reverse shells.☆68Updated 3 weeks ago