PWN Challenge
☆11Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below
Sorting:
- ☆17Aug 31, 2014Updated 11 years ago
- ☆52Dec 28, 2023Updated 2 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- This repository contain recurring IoT vulnerabilities found by FirmRec.☆18Aug 25, 2023Updated 2 years ago
- ☆20Nov 4, 2020Updated 5 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- ☆13May 9, 2023Updated 2 years ago
- TRACY☆19Jul 1, 2016Updated 9 years ago
- amd64 Linux docker container for cross-compilation to FreeBSD.☆12May 22, 2024Updated last year
- Custom CTFd theme made for TSG CTF☆32Updated this week
- Material from ICS Village talk at DEFCON 25☆13Jul 30, 2018Updated 7 years ago
- tp-link Decrypt/Crypt Config files☆15Oct 25, 2022Updated 3 years ago
- ☆11Sep 1, 2023Updated 2 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- ☆14Sep 5, 2024Updated last year
- CTF write-up☆35Jan 11, 2024Updated 2 years ago
- Web wrapper of niklasb/libc-database☆214Nov 24, 2024Updated last year
- 一本 CTF 领域的大杂烩指南☆14Mar 6, 2020Updated 6 years ago
- ☆11Jul 5, 2023Updated 2 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆36Jan 22, 2021Updated 5 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- DIR-850L A1 Firmware GPL source☆12Mar 9, 2020Updated 6 years ago
- 这是一个获取任意切换libc版本和源码级别调试能力的仓库☆12Mar 13, 2020Updated 6 years ago
- acropalypse screenshot recovery utility☆18Mar 18, 2023Updated 3 years ago
- A fuzzing framework targeted at MQTT brokers. Modeled as a finite state machine (using Markov Modeling).☆38Jul 11, 2023Updated 2 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Templates for deploying pwn challenge in ctf☆53Mar 24, 2023Updated 2 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆25Dec 19, 2023Updated 2 years ago
- ☆112Dec 23, 2025Updated 2 months ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- Links Panel, collecting all the links on a page☆16Jun 19, 2025Updated 9 months ago
- TG:HACK 2020☆36Mar 24, 2023Updated 2 years ago
- Collection of Berachain validators resources☆20Apr 18, 2025Updated 11 months ago
- ☆84Oct 23, 2020Updated 5 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- cross platform asynchronous networking library☆10Apr 1, 2020Updated 5 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago