Gallopsled / pwntools
CTF framework and exploit development library
☆12,099Updated last week
Related projects ⓘ
Alternatives and complementary repositories for pwntools
- A repository for learning various heap exploitation techniques.☆7,223Updated 2 months ago
- Exploit Development and Reverse Engineering with GDB Made Easy☆7,602Updated this week
- PEDA - Python Exploit Development Assistance for GDB☆5,890Updated 3 months ago
- Some setup scripts for security research tools.☆8,500Updated 11 months ago
- A powerful and user-friendly binary analysis platform!☆7,574Updated this week
- Course materials for Modern Binary Exploitation by RPISEC☆5,472Updated 2 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆3,923Updated last month
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆6,976Updated this week
- Linux privilege escalation auditing tool☆5,633Updated 8 months ago
- An advanced memory forensics framework☆7,315Updated last year
- Tutorials for getting started with Pwntools☆1,403Updated last month
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆5,712Updated last month
- Monitor linux processes without root permissions☆4,952Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,019Updated last year
- A collection of links related to Linux kernel security and exploitation☆5,611Updated last week
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,591Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,735Updated last year
- A swiss army knife for pentesting networks☆8,438Updated 11 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,233Updated 11 months ago
- ✍️ A curated list of CVE PoCs.☆3,320Updated 2 years ago
- Web application fuzzer☆5,954Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13,509Updated 2 weeks ago
- CTFs as you need them☆5,672Updated this week
- Collection of CTF Web challenges I made☆2,685Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,517Updated 4 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,332Updated 7 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,784Updated 6 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,560Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,777Updated 6 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,755Updated 4 months ago