Kyle-Kyle / pwning-toolsetView external linksLinks
Personal pwning toolset developed/used by myself. Use at your own risk.
☆18Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for pwning-toolset
Users that are interested in pwning-toolset are comparing it to the libraries listed below
Sorting:
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆28Aug 26, 2025Updated 5 months ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Mar 8, 2022Updated 3 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- ☆21Nov 3, 2018Updated 7 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- A code-searching/completion tool, for IDA APIs☆83Jan 22, 2025Updated last year
- QEMU escape code☆63Jun 6, 2021Updated 4 years ago
- IDA plugin to make classes automatically☆20Oct 31, 2024Updated last year
- ☆47Dec 29, 2018Updated 7 years ago
- Remove WPP calls from hexrays decompiled code☆56Jan 31, 2026Updated 2 weeks ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Heap exploitation technique bypassing heap ASLR☆48Sep 2, 2019Updated 6 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- Abstract library to generate angr states from a debugger state☆61Jul 5, 2020Updated 5 years ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Python bindings for calling radamsa mutators☆27Oct 7, 2021Updated 4 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- A simple script for quickly mining sensitive information in binary files.☆30Dec 1, 2020Updated 5 years ago
- Exposing and documenting v8 runtime functions.☆28Jul 1, 2014Updated 11 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- ☆189Feb 8, 2025Updated last year
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- ☆39Jul 25, 2025Updated 6 months ago