Pwnable tips & writeups.
☆23Dec 11, 2016Updated 9 years ago
Alternatives and similar repositories for pwnable-writeups
Users that are interested in pwnable-writeups are comparing it to the libraries listed below
Sorting:
- Write-ups of the challenges on pwnable.kr☆21Nov 9, 2020Updated 5 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Python GDB RDP client (replaces gdb for QEMU tcp debug)☆12Apr 22, 2022Updated 3 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Attack graph construction and analysis☆36May 18, 2019Updated 6 years ago
- Python to analyse bitcoin blockchain, chainstate, blockindex, mempool etc☆10Jun 18, 2019Updated 6 years ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- linux内核提权后门模块demo☆36Jun 11, 2019Updated 6 years ago
- ☆17Aug 3, 2025Updated 6 months ago
- Library built from scratch to implement zk-protocols☆13Dec 13, 2023Updated 2 years ago
- ☆11Dec 10, 2017Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago
- ☆11Mar 31, 2023Updated 2 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- PATRIOTIC - Pervasive Anti-Tampering and Anti-Repackaging for IoT for Integrated C-based Firmware☆10Jan 26, 2023Updated 3 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- オリジナルの漢字テストを作成するWebアプリ☆12Mar 5, 2024Updated last year
- ☆13Aug 28, 2018Updated 7 years ago
- ☆14May 20, 2019Updated 6 years ago
- Repository containing the PhD Thesis "Formal Verification of Deep Reinforcement Learning Agents"☆11Aug 29, 2022Updated 3 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- An implementation of vdist2vec model in paper A Learning Based Approach to Predict Shortest-Path Distances☆11Apr 8, 2022Updated 3 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- [NeurIPS 2023] and [ICLR 2024] for robustness certification.☆10Nov 30, 2024Updated last year
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- Compile circom code to llvm partially☆12Feb 14, 2023Updated 3 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- BandMaxSAT: Multi-armed Bandit for the Local Search MaxSAT Solver☆11Mar 28, 2023Updated 2 years ago
- ☆14Aug 28, 2023Updated 2 years ago
- A Computational Graph Generator for AI Compiler Fuzzing☆16May 31, 2023Updated 2 years ago
- Aptos Keyless ZK circuit implementation in circom, together with a Rust-based ZK proving service☆20Feb 12, 2026Updated 2 weeks ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- CGA2M_plus is a Python package of Constraint GA2M plus(CGA2M+), which we proposed. CGA2M+ is a model that improves GA2M in two respects: …☆16Jun 17, 2023Updated 2 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- Circom circuits library for magnificent ZK applications☆14Jun 4, 2025Updated 8 months ago
- L3-37 Alexa Raspberry Pi code☆15Jun 28, 2018Updated 7 years ago