A pwning environment, now on docker!
☆18Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for pwndock
Users that are interested in pwndock are comparing it to the libraries listed below
Sorting:
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- CVE/Research Publications☆25Jul 4, 2023Updated 2 years ago
- Linux x86_64 Process Injection Utility☆58Mar 9, 2021Updated 5 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆41Jul 22, 2021Updated 4 years ago
- Using Spotify Playlists as Malware CDN☆26Feb 1, 2021Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Disk scheduling GUI program☆11Jun 22, 2022Updated 3 years ago
- Tools for unpacking and repacking firmware images for the Insta360 X3☆11Sep 19, 2023Updated 2 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Files accompanying helm security blog post☆12Aug 7, 2021Updated 4 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Interactive IRC bot and logger in pure Bash☆16Dec 12, 2012Updated 13 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- a transparent filter for all of the various ways of sharing location☆10Apr 26, 2019Updated 6 years ago