Grazfather / pwndockView external linksLinks
A pwning environment, now on docker!
☆18Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for pwndock
Users that are interested in pwndock are comparing it to the libraries listed below
Sorting:
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- ☆16Jul 14, 2023Updated 2 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- Linux x86_64 Process Injection Utility☆58Mar 9, 2021Updated 4 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- A python library to find one-gadget☆30Feb 22, 2019Updated 6 years ago
- H-E-B Curbside availability finder☆10Feb 6, 2021Updated 5 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- Using Spotify Playlists as Malware CDN☆26Feb 1, 2021Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Tools for unpacking and repacking firmware images for the Insta360 X3☆11Sep 19, 2023Updated 2 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Official training ground for the OTA CTF team☆39Dec 7, 2022Updated 3 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- Workaround for "key must be a string" error with serde_json. De/serialize any HashMap<K,V>, Vec<(K,V)>, Iter<(&K,&V)>, or Iter<&(K,V)> as…☆13Nov 6, 2025Updated 3 months ago
- ☆10Nov 21, 2023Updated 2 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Client for the Webkit Remote Debugging server☆17Dec 28, 2018Updated 7 years ago
- my knowledge of linux privilege escalation☆10Oct 14, 2023Updated 2 years ago
- tfa is a 2fa cli tool that aims to help you to generate 2fa code on CI/CD pipelines.☆28Oct 26, 2021Updated 4 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- Go crypto.Signer and crypto.Decrypter that uses AWS KMS asymmetric keys☆11Jan 2, 2024Updated 2 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16May 11, 2021Updated 4 years ago
- Marlin Simulator UI☆15Dec 1, 2025Updated 2 months ago