A tool to initialize pwn game exploit enviroment.
☆44Nov 27, 2025Updated 3 months ago
Alternatives and similar repositories for cpwn
Users that are interested in cpwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- some kernel pwn practice questions.☆25Nov 25, 2024Updated last year
- 本项目是一个以“实战为导向”的 XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景。页面样式统一,逻辑清晰,适合系统化学习与教学演示☆28Mar 6, 2026Updated 2 weeks ago
- ☆15Dec 27, 2022Updated 3 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Software Exploitation☆11Sep 22, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Multi-instance IDA Pro MCP server — analyze multiple binaries simultaneously through a single MCP endpoint.☆94Updated this week
- 正规子群.AI Agent | SubgroupX: A high-performance AI Agent for offensive security, Coding, CTF operations, and active defense protocols. Arch…☆328Jan 23, 2026Updated 2 months ago
- ☆20Dec 4, 2023Updated 2 years ago
- pwndbg、pwn-peda、pwn-gef和Pwngdb四合一,一合四,通过命令gdb-peda、gdb-pwndbg、gdb-peda轻松切换gdb插件☆39Oct 23, 2023Updated 2 years ago
- ☆15May 30, 2019Updated 6 years ago
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- Automatic use of House of Some & House of Illusion.☆87Sep 9, 2025Updated 6 months ago
- A statically compiled gdb/gdbserver-17.x repository☆216Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Android第三代加壳技术☆24Aug 19, 2021Updated 4 years ago
- 修改二进制文件依赖的libc ,ctf pwn的实用小工具☆14Sep 27, 2023Updated 2 years ago
- Windows Win32 Kernel Subsystem☆37Aug 23, 2025Updated 7 months ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- An ida plug-in that matches the bulk removal of junk instructions from the program | 批量匹配去除花指令的ida插件☆13Sep 6, 2023Updated 2 years ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- pwn log tools for AWD☆12May 29, 2018Updated 7 years ago
- NCTF 2023 challenges and writeups☆15Dec 30, 2023Updated 2 years ago
- Templates for deploying pwn challenge in ctf☆53Mar 24, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 莱云 控制面板☆10May 16, 2023Updated 2 years ago
- 一些关于ISCC平台的实用脚本☆10Jun 2, 2024Updated last year
- some pwn or re challenge in ctf games☆40Sep 24, 2019Updated 6 years ago
- 🔍 LibcSearcher-ng -- get symbols' offset in glibc.☆114Jan 30, 2023Updated 3 years ago
- A Python bytecode reversing tool built in pure Rust☆17Sep 2, 2024Updated last year
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 6 months ago
- SUSTech CS202/CS214 Computer Organization Project. Streams Bad Apple.☆10Dec 11, 2023Updated 2 years ago
- A systematic, AI-powered penetration testing reasoning engine (MCP server) for attack path planning, CTF/HTB solving, and automated pente…☆29Aug 30, 2025Updated 6 months ago
- 一键搭建调试 pwn 题的 docker 环境☆26Jan 22, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆273Aug 2, 2025Updated 7 months ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- ☆55Apr 28, 2022Updated 3 years ago
- Multi-Server PIR (CCSW'14)☆11Dec 2, 2020Updated 5 years ago
- Do pwn by command line☆424Apr 27, 2025Updated 10 months ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year