Building binutils for pwntools
☆84Jan 23, 2026Updated last month
Alternatives and similar repositories for pwntools-binutils
Users that are interested in pwntools-binutils are comparing it to the libraries listed below
Sorting:
- ☆21Feb 20, 2014Updated 12 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- A bucket of various work-in-progress rtl-sdr ideas.☆22Mar 5, 2017Updated 8 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Library and tools to access the Common Log File System (CLFS)☆25Dec 4, 2025Updated 2 months ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Fun with iOS☆13Aug 3, 2013Updated 12 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Forensic Artifact Collection Tool for macOS☆118Jul 28, 2025Updated 7 months ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆56Feb 28, 2023Updated 3 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆10May 23, 2017Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Source code and tools of the former Mobile-Sandbox☆12Jan 4, 2019Updated 7 years ago
- 整理统计MacOSX的安全补丁与修复的漏洞☆10May 23, 2016Updated 9 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- ☆15May 23, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Working with numbers (primes, modular, etc.)☆246Jul 15, 2022Updated 3 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- For Linux binary Exploitation☆844Mar 26, 2018Updated 7 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- A keygen for Carbon Copy Cloner private keychain☆14Oct 26, 2018Updated 7 years ago
- A JupyterLite deployment to try JupyterLab, Jupyter Notebook and IPython in the browser☆13Jan 14, 2026Updated last month