A tool to initialize pwn game exploit enviroment.
☆42Nov 27, 2025Updated 3 months ago
Alternatives and similar repositories for cpwn
Users that are interested in cpwn are comparing it to the libraries listed below
Sorting:
- Pwntools Extension with No Extra Effort!☆15Jun 29, 2025Updated 8 months ago
- pwn log tools for AWD☆12May 29, 2018Updated 7 years ago
- some kernel pwn practice questions.☆24Nov 25, 2024Updated last year
- ☆15Dec 27, 2022Updated 3 years ago
- ☆15May 30, 2019Updated 6 years ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆23Mar 16, 2025Updated 11 months ago
- ☆21Apr 6, 2025Updated 10 months ago
- 一键搭建调试 pwn 题的 docker 环境☆26Jan 22, 2026Updated last month
- ☆27Feb 13, 2026Updated 2 weeks ago
- Android第三代加壳技术☆24Aug 19, 2021Updated 4 years ago
- 正规子群.AI Agent | SubgroupX: A high-performance AI Agent for offensive security, Coding, CTF operations, and active defense protocols. Arch…☆308Jan 23, 2026Updated last month
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆34Nov 8, 2024Updated last year
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- Archive of attachments from previous CTF competitions☆119Jun 5, 2023Updated 2 years ago
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 5 months ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- 本项目是一个以“实战为导向”的 XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景。页面样式统一,逻辑清晰,适合系统化学习与教学演示☆21Jan 10, 2026Updated last month
- ☆272Aug 2, 2025Updated 7 months ago
- ☆32Aug 16, 2020Updated 5 years ago
- 自己收集与编写的常用IDA脚本,通常用于反混淆☆91Feb 28, 2025Updated last year
- pwndbg、pwn-peda、pwn-gef和Pwngdb四合一,一合四,通过命令gdb-peda、gdb-pwndbg、gdb-peda轻松切换gdb插件☆39Oct 23, 2023Updated 2 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- An improved "hitbox patch" for 東方紅魔郷~ the Embodiment of Scarlet Devil☆13Oct 22, 2011Updated 14 years ago
- choose demo☆21Nov 6, 2025Updated 3 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- 收集IOT安全相关资料☆122Apr 20, 2025Updated 10 months ago
- Templates for deploying pwn challenge in ctf☆51Mar 24, 2023Updated 2 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- ☆11Jun 10, 2016Updated 9 years ago
- kernel module for modifying device information...☆22Sep 24, 2025Updated 5 months ago
- Multi-instance IDA Pro MCP server — analyze multiple binaries simultaneously through a single MCP endpoint.☆38Feb 18, 2026Updated 2 weeks ago
- ☆12Feb 20, 2016Updated 10 years ago
- Dockerfile for Pwnable☆13Apr 3, 2025Updated 11 months ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Small library coming from a personal student study on different SHA algorithms.☆12Sep 22, 2020Updated 5 years ago