A GDB+GEF-style debugger for unloading Python pickles
☆70Jul 5, 2025Updated 8 months ago
Alternatives and similar repositories for pickledbg
Users that are interested in pickledbg are comparing it to the libraries listed below
Sorting:
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- ☆15Sep 2, 2024Updated last year
- ☆26Feb 24, 2022Updated 4 years ago
- ctf writeup and log☆48Nov 30, 2024Updated last year
- ☆12Jan 10, 2024Updated 2 years ago
- Documentation for Vilo router vulnerability research☆15Oct 21, 2024Updated last year
- Solving linear systems over GF(2) by manipulating bitvectors☆82Feb 12, 2026Updated 3 weeks ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆176Jan 1, 2025Updated last year
- ☆37May 10, 2024Updated last year
- GEF - GDB Enhanced Features - bata24's fork☆623Feb 27, 2026Updated last week
- ☆13Dec 14, 2021Updated 4 years ago
- Python sandbox escape wiki + payload generator☆141Sep 18, 2024Updated last year
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Aug 1, 2020Updated 5 years ago
- ExploitFarm is an attacker and flag submitter for A/D CTF☆40Jan 27, 2026Updated last month
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆491Oct 11, 2025Updated 4 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87May 25, 2023Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- A save game exploit for Rollercoaster Tycoon 1, as presented at Districtcon Junkyard 2026☆50Jan 25, 2026Updated last month
- various docs (that are interesting, or not, depending on the point of view...)☆138Dec 31, 2023Updated 2 years ago
- 🎵 Official source code and writeups for SekaiCTF 2023!☆145Aug 20, 2025Updated 6 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆127Jun 9, 2023Updated 2 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 10 months ago
- A Python Package For Reverse Engineering.☆28Jan 19, 2025Updated last year
- Network analysis tool for Attack Defence CTF☆425Oct 6, 2025Updated 5 months ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago
- An intuitive query API for IDA Pro☆167Oct 20, 2025Updated 4 months ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- Inti easter challenge poc☆18May 4, 2021Updated 4 years ago
- Website of Project SEKAI, a CTF team.☆22Dec 15, 2025Updated 2 months ago
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 4 years ago
- A Python library to debug binary executables, your own way.☆294Feb 19, 2026Updated 2 weeks ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- Find all libraries on cdn.js that pollute your prototype☆19Sep 1, 2022Updated 3 years ago
- 一个用于暴力破解猫变换(Arnold's Cat Map)加密图像的命令行工具。☆26Dec 21, 2025Updated 2 months ago