My customized docker image used for binary exploitation and RE
☆14Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for mypwndock
Users that are interested in mypwndock are comparing it to the libraries listed below
Sorting:
- ☆22Dec 30, 2025Updated 2 months ago
- ☆11May 22, 2023Updated 2 years ago
- Typed binary parsing for typescript☆16Sep 4, 2023Updated 2 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- coekie's scripts for irssi☆20May 8, 2010Updated 15 years ago
- Deals with repetition in Slack Claude. Removes any XML tags or ["A:" ; "H:" ; "Human:" ; "Assistant:"] from Claude's responses. Recommend…☆12Jul 10, 2023Updated 2 years ago
- Javacard Applet for functioning paypass credential☆12Sep 26, 2013Updated 12 years ago
- Interface definitions for the Compute@Edge platform in witx.☆15Feb 11, 2022Updated 4 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- A pure-rust implementation of the GVariant serialisation format☆13Jul 7, 2025Updated 8 months ago
- DCS World Mod Manager☆11May 21, 2025Updated 9 months ago
- Paradoxes in Set Theory and Type Theory☆12Jul 24, 2024Updated last year
- Evolutionary Search for expert-level performance on any task with environmental feedback☆14Oct 12, 2025Updated 4 months ago
- ☆13Oct 6, 2022Updated 3 years ago
- ☆10Aug 12, 2023Updated 2 years ago
- ☆15Updated this week
- Network Tap based on the ZedBoard and Ethernet FMC☆15Feb 28, 2026Updated last week
- Creating executables from ELF-coredumps☆10Dec 7, 2015Updated 10 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- A Raspberry Pi Pico (RP2040) based Apple IIe expansion card with USB isolation.☆12Apr 21, 2021Updated 4 years ago
- Cscope Extension for Code☆13Jan 19, 2026Updated last month
- Automate basic shell and vim configurations☆11Oct 25, 2022Updated 3 years ago
- Prints windows exe header and export/import info☆10May 6, 2022Updated 3 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- Git CTF 🚩 Can you get on the leaderboards?☆12Dec 23, 2020Updated 5 years ago
- Krescue - tiny fast rescue / installation system for ARM SBCs☆10Mar 3, 2023Updated 3 years ago
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- Simple Scheduler library with no priority and non-preemptive scheduling scheme☆15Mar 17, 2014Updated 11 years ago
- Sync your PocketBase data with Turso. This library enables distributed PocketBase with Turso primary database as master.☆14Apr 16, 2024Updated last year
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- Dradis API Python Wrapper☆13Mar 19, 2024Updated last year
- Specific implementation (based on the public rbuilder) of a block builder to be used on a TDX context.☆18Sep 30, 2025Updated 5 months ago
- ☆11Mar 2, 2026Updated last week
- Proof of concept on a predictive maintenance use case using federated learning to continuously improve predictions of the remaining life…☆11Feb 21, 2020Updated 6 years ago
- Make pixel art in emacs buffers.☆14Feb 22, 2023Updated 3 years ago
- Social graphs for ERC☆15May 8, 2015Updated 10 years ago