Personal pwning toolset developed/used by myself. Use at your own risk.
☆18Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for pwning-toolset
Users that are interested in pwning-toolset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆12Mar 28, 2022Updated 4 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆28Aug 26, 2025Updated 7 months ago
- Animação Viral para combate ao mosquito Aedes Aegypti - Mosquitos da dengue voando em seu blog ou site. Confira demostração no link:☆14Apr 6, 2016Updated 9 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- Kathara labs for Practical Network Defense course at Sapienza☆16Mar 4, 2026Updated 3 weeks ago
- ☆21Nov 3, 2018Updated 7 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Abstract library to generate angr states from a debugger state☆61Jul 5, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- This is the open source version of vulnerable.codes platform.☆29Apr 17, 2025Updated 11 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- A code-searching/completion tool, for IDA APIs☆83Jan 22, 2025Updated last year
- Extract data of TTD trace file to a minidump☆30Jul 31, 2023Updated 2 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- ☆13Aug 22, 2022Updated 3 years ago
- qemu vulnerablity.☆56May 25, 2021Updated 4 years ago
- ☆16Feb 27, 2026Updated last month
- Python bindings for calling radamsa mutators☆27Feb 21, 2026Updated last month
- ☆14Mar 18, 2025Updated last year
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 3 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆201Mar 14, 2024Updated 2 years ago
- Exposing and documenting v8 runtime functions.☆28Jul 1, 2014Updated 11 years ago