Fineas / PwnyLandView external linksLinks
A stacked docker environment for solving CTF PWN challenges.
☆10Dec 4, 2021Updated 4 years ago
Alternatives and similar repositories for PwnyLand
Users that are interested in PwnyLand are comparing it to the libraries listed below
Sorting:
- ☆14Aug 28, 2023Updated 2 years ago
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Nov 19, 2020Updated 5 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- A tool to inject C code into ELF64 binaries☆30May 25, 2021Updated 4 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- The Manticore User Interface with plugins for Binary Ninja and Ghidra☆75Mar 20, 2024Updated last year
- ☆46Jul 30, 2023Updated 2 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Disk scheduling GUI program☆11Jun 22, 2022Updated 3 years ago
- Tools for unpacking and repacking firmware images for the Insta360 X3☆11Sep 19, 2023Updated 2 years ago
- Open source card game☆19Jan 9, 2016Updated 10 years ago
- ☆13Oct 29, 2024Updated last year
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Static analysis framework for Polynomial Identity Language (PIL) used in zkEVM for defining state machines☆11Feb 13, 2023Updated 3 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Workaround for "key must be a string" error with serde_json. De/serialize any HashMap<K,V>, Vec<(K,V)>, Iter<(&K,&V)>, or Iter<&(K,V)> as…☆13Nov 6, 2025Updated 3 months ago
- ☆14Jul 19, 2023Updated 2 years ago
- A red packet social application that combines the privacy chat on ComingChat and the omnichain wallet on ComingChat.☆15Nov 2, 2022Updated 3 years ago
- ☆10Jun 2, 2021Updated 4 years ago
- A Socket.IO middleware for authenticating with a JSON Web Token based on passport-jwt.☆10Jul 19, 2017Updated 8 years ago
- ☆12Jul 4, 2024Updated last year
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- A C++ memory context☆11Jul 28, 2021Updated 4 years ago
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.☆10Dec 30, 2025Updated last month
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- ☆17Aug 31, 2014Updated 11 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Jul 27, 2022Updated 3 years ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆16Aug 27, 2022Updated 3 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- ☆16Apr 12, 2024Updated last year
- L3-37 Alexa Raspberry Pi code☆15Jun 28, 2018Updated 7 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago