A tool to initialize pwn game exploit enviroment.
☆44Nov 27, 2025Updated 4 months ago
Alternatives and similar repositories for cpwn
Users that are interested in cpwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pwntools Extension with No Extra Effort!☆15Jun 29, 2025Updated 9 months ago
- ☆15Dec 27, 2022Updated 3 years ago
- ☆21Apr 6, 2025Updated last year
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- ☆20Dec 4, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 正规子群.AI Agent | SubgroupX: A high-performance AI Agent for offensive security, Coding, CTF operations, and active defense protocols. Arch…☆330Jan 23, 2026Updated 2 months ago
- pwndbg、pwn-peda、pwn-gef和Pwngdb四合一,一合四,通过命令gdb-peda、gdb-pwndbg、gdb-peda轻松切换gdb插件☆39Oct 23, 2023Updated 2 years ago
- ☆15May 30, 2019Updated 6 years ago
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- Automatic use of House of Some & House of Illusion.☆87Apr 1, 2026Updated 2 weeks ago
- Android第三代加壳技术☆24Aug 19, 2021Updated 4 years ago
- Windows Win32 Kernel Subsystem☆37Aug 23, 2025Updated 7 months ago
- A statically compiled gdb/gdbserver-17.x repository☆222Mar 28, 2026Updated 2 weeks ago
- An ida plug-in that matches the bulk removal of junk instructions from the program | 批量匹配去除花指令的ida插件☆13Sep 6, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- pwn log tools for AWD☆12May 29, 2018Updated 7 years ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- NCTF 2023 challenges and writeups☆15Dec 30, 2023Updated 2 years ago
- CTF python逆向入门教程☆21Jan 5, 2025Updated last year
- ☆30Feb 13, 2026Updated 2 months ago
- Templates for deploying pwn challenge in ctf☆55Mar 24, 2023Updated 3 years ago
- 莱云 控制面板☆10May 16, 2023Updated 2 years ago
- 一些关于ISCC平台的实用脚本☆10Jun 2, 2024Updated last year
- 🔍 LibcSearcher-ng -- get symbols' offset in glibc.☆115Jan 30, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- some pwn or re challenge in ctf games☆40Sep 24, 2019Updated 6 years ago
- A Python bytecode reversing tool built in pure Rust☆17Sep 2, 2024Updated last year
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 7 months ago
- SUSTech CS202/CS214 Computer Organization Project. Streams Bad Apple.☆10Dec 11, 2023Updated 2 years ago
- ☆278Aug 2, 2025Updated 8 months ago
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- ☆55Apr 4, 2026Updated last week
- Multi-Server PIR (CCSW'14)☆11Dec 2, 2020Updated 5 years ago
- Do pwn by command line☆430Apr 2, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆27Mar 9, 2024Updated 2 years ago
- ☆32Aug 16, 2020Updated 5 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- 收集IOT安全相关资料☆122Apr 20, 2025Updated 11 months ago
- A CTF fuzz powerd by protobuf.☆15May 24, 2022Updated 3 years ago
- csie.ctf.tw☆15Jan 13, 2017Updated 9 years ago