All the CTF tools you need in a docker container just one command away.
☆23Jun 16, 2025Updated 9 months ago
Alternatives and similar repositories for pwnkit
Users that are interested in pwnkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- Hours of ricing and many more to come☆11Jul 11, 2019Updated 6 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- ☆14May 9, 2020Updated 5 years ago
- Simple LDAP client for OpenBSD using aldap, pledge(2) and no OpenLDAP☆15Jun 13, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 视频直播项目☆11Dec 30, 2025Updated 3 months ago
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 11 years ago
- A github action that allows you to run a vulnerability scan.☆16Dec 1, 2023Updated 2 years ago
- 《自己动手设计数据库》摘录☆10Oct 28, 2016Updated 9 years ago
- ☆15Sep 27, 2017Updated 8 years ago
- A module for the MagicMirror, to display data from FHEM devices.☆12Oct 28, 2019Updated 6 years ago
- A PE Header-Based Antivirus Tool☆12Nov 14, 2014Updated 11 years ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- Extract .jpg files from video, with accurate frame rate manipulation☆15May 10, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- TCACHE (thread local caching in glibc malloc) attack vector common in heap exploitation☆12Apr 6, 2018Updated 8 years ago
- An opensource online & virtual judge system base on skvj.☆14Dec 13, 2016Updated 9 years ago
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- This can be used to spoof location of any iOS device using Xcode☆13Mar 28, 2020Updated 6 years ago
- An introduction to buffer overflow vulnerabilities exploitation.☆14Oct 21, 2022Updated 3 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- Example of how to deploy Rust code on a balena supported device.☆20Apr 28, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SPiCa (System Process Integrity & Cross-view Analysis) is a high-performance, eBPF-based rootkit detection engine written in Rust, inspir…☆103Apr 3, 2026Updated last week
- This project allows you to have a set of aliases defined per directory and subdirectories☆11Aug 15, 2021Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 4 years ago
- ARM (A32) Linux Return-oriented Programming with Raspberry Pi☆13Sep 28, 2022Updated 3 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- @davidtwco's dotfiles - managed by chezmoi!☆14Jan 16, 2026Updated 2 months ago
- Monitor websites for changes☆29Updated this week
- A simple Online Judge system.☆13Feb 15, 2016Updated 10 years ago
- The anthy engine for IBus☆32Dec 21, 2011Updated 14 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 3DS python tools☆59Jan 15, 2014Updated 12 years ago
- ☆23Jul 10, 2025Updated 9 months ago
- easily bind shellcheck and shfmt to your CI, so your shellscripts can be checked.☆16Jun 24, 2022Updated 3 years ago
- A Pi-hole equivalent for the Unifi Security Gateway☆31Dec 29, 2020Updated 5 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- ☆26May 27, 2016Updated 9 years ago