GhostFrankWu / SAEGView external linksLinks
SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.
☆175Jan 1, 2025Updated last year
Alternatives and similar repositories for SAEG
Users that are interested in SAEG are comparing it to the libraries listed below
Sorting:
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- 一个用于暴力破解猫变换(Arnold's Cat Map)加密图像的命令行工具。☆26Dec 21, 2025Updated last month
- A GDB+GEF-style debugger for unloading Python pickles☆70Jul 5, 2025Updated 7 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- ☆35Apr 14, 2025Updated 10 months ago
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- Do pwn by command line☆416Apr 27, 2025Updated 9 months ago
- Archive of AAA CTF 2023 (XCTF competition)☆37Nov 27, 2023Updated 2 years ago
- ☆23Jan 27, 2026Updated 2 weeks ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- For V8CTF M123☆17Aug 25, 2024Updated last year
- ☆270Aug 2, 2025Updated 6 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- Small rust binary analysis helper for IDA.☆92Jul 14, 2024Updated last year
- prebuilt binaries for multiple architeture☆200Mar 7, 2023Updated 2 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- A Python Package For Reverse Engineering.☆28Jan 19, 2025Updated last year
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- 使用Docker一键制作Vol2取证需要的Profile☆22Aug 31, 2025Updated 5 months ago
- ☆12Oct 31, 2024Updated last year
- An automated ROP generation work☆12Mar 5, 2025Updated 11 months ago
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 7 months ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 6 months ago
- 从CTF比赛平台批量下载附件。A tool for downloading attachments in bulk from CTF events on platforms. [计划重新设计 Redesign planned]☆14Dec 20, 2025Updated last month
- basic amd64 alphanumeric shellcode encoder☆200Jan 15, 2024Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆771Jan 19, 2026Updated 3 weeks ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- Safari 1day RCE Exploit☆153Mar 22, 2025Updated 10 months ago
- Write dynamic binary analysis tools in Python☆129Jul 25, 2025Updated 6 months ago
- ☆27Feb 6, 2024Updated 2 years ago
- kernel-pwn and writeup collection☆693Oct 2, 2023Updated 2 years ago
- ☆314Jun 27, 2024Updated last year
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year