Legoclones / pickledbgLinks
A GDB+GEF-style debugger for unloading Python pickles
☆68Updated 4 months ago
Alternatives and similar repositories for pickledbg
Users that are interested in pickledbg are comparing it to the libraries listed below
Sorting:
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 2 months ago
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆51Updated last month
- Source code for the DEF CON 31 CTF Qualifiers.☆125Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- public archive for corCTF 2023☆18Updated 2 years ago
- ☆45Updated 2 months ago
- ☆36Updated last year
- A tool for automating setup of kernel pwn challenges☆60Updated 2 weeks ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆93Updated last week
- a new class of file structure attacks☆57Updated 2 years ago
- An intuitive query API for IDA Pro☆162Updated 3 weeks ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆232Updated 10 months ago
- ☆251Updated 3 months ago
- ☆23Updated 2 years ago
- Source code for the DEF CON 33 CTF Qualifiers.☆53Updated 2 months ago
- 🎵 Official source code and writeups for SekaiCTF 2024!☆85Updated 2 months ago
- Challenge source code and author write-ups for KalmarCTF☆68Updated 7 months ago
- A Linux Kernel Exploitation C Library☆18Updated 2 weeks ago
- Write dynamic binary analysis tools in Python☆126Updated 3 months ago
- Writeups for CTFs☆78Updated 2 months ago
- ☆16Updated 2 years ago
- All challenges and writups of the GlacierCTF 2023☆17Updated last year
- MCP for Pwn☆145Updated last week
- Let's get familiar with Windows pwn 😎☆55Updated 5 years ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- Challenges and solutions for Maple CTF 2022.☆28Updated 3 years ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆172Updated 10 months ago
- visualizing CTF clusters (teams playing together at DEFCON)☆28Updated 2 years ago
- Source code and solution of CTF challenges that I created.☆45Updated 4 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 9 months ago