pwn database
☆18Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for Pwn
Users that are interested in Pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- ☆30Sep 6, 2022Updated 3 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- headless-ida-mcp-server☆37Apr 4, 2025Updated 11 months ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- ENOFLAG writeups☆24Oct 31, 2022Updated 3 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago
- Dockerized setup for quick pwning☆23Mar 2, 2021Updated 5 years ago
- My CTF Challenges. No one plays.☆13Dec 4, 2022Updated 3 years ago
- ☆14Jul 1, 2025Updated 8 months ago
- ☆12May 31, 2018Updated 7 years ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 6 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 2 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- llolbas is a repo containing a localized and off-line version of the ever popular Living Off the Land Binaries and Scripts (LOLBAS) proje…☆11May 1, 2023Updated 2 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- pwntools for go!☆22Feb 27, 2019Updated 7 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- My CTF Challenges☆22Oct 10, 2023Updated 2 years ago
- Security-Oriented Analysis of Application Programs☆13Dec 14, 2018Updated 7 years ago
- practice☆69Mar 19, 2020Updated 6 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago