Giotino / LessDestructiveFarmLinks
☆12Updated 2 years ago
Alternatives and similar repositories for LessDestructiveFarm
Users that are interested in LessDestructiveFarm are comparing it to the libraries listed below
Sorting:
- A Python library to debug binary executables, your own way.☆294Updated 2 weeks ago
- Automatic tool to quickly start a pwn CTF challenge☆45Updated 2 years ago
- Many-Time Pad Interactive☆176Updated last year
- Network analysis tool for Attack Defence CTF☆421Updated 4 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆75Updated last year
- VirtuAlization GDb integrations in pwntools☆38Updated last month
- Source code and documentation for TeamItaly CTF 2023 challenges☆21Updated 2 years ago
- An open-source SBox analysis utility☆18Updated 10 months ago
- pwninit - automate starting binary exploit challenges☆1,058Updated 2 months ago
- Firegex, a firewall for Attack-Defense CTFs☆93Updated 2 months ago
- ☆46Updated 2 years ago
- ☆16Updated 7 months ago
- GEF - GDB Enhanced Features - bata24's fork☆609Updated last week
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆249Updated last year
- Source code and documentation for TeamItaly CTF 2022 challenges☆45Updated 2 years ago
- knowledge is power☆230Updated last month
- A full English version of the popular ctf-wiki☆109Updated last year
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆30Updated last year
- Write-ups for various CTF☆217Updated 5 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2025☆39Updated last year
- A pure python tool to implement/exploit the hash length extension attack☆37Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆191Updated 2 years ago
- ☆12Updated last year
- FSOP Again☆32Updated 3 years ago
- ropr with some tweaks for better linux kernel support☆36Updated 9 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆88Updated 2 months ago
- SMT based attacks on non cryptographic PRNGs☆91Updated 2 years ago
- ☆12Updated 6 months ago