Automatic tool to quickly start a pwn CTF challenge
☆45Nov 3, 2023Updated 2 years ago
Alternatives and similar repositories for spwn
Users that are interested in spwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a command line tool that let you express commands in natural language using openai api..☆40Dec 4, 2025Updated 5 months ago
- A Python library to debug binary executables, your own way.☆305Apr 15, 2026Updated last month
- Kernel PWN Tooklkit aimed mainly for CTF players☆18Jul 31, 2024Updated last year
- A cli-based, multi-architecture gadget-finding tool, designed for fast operation, even with large binaries like browser engines and OS ke…☆17May 1, 2024Updated 2 years ago
- A python module to facilitate gdb scripting☆10Jan 12, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆49Jan 22, 2026Updated 3 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆92Feb 21, 2026Updated 2 months ago
- Fingerprinting TCP/IP☆36Jul 8, 2024Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆271Oct 2, 2025Updated 7 months ago
- ☆17Jun 26, 2025Updated 10 months ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Write-ups for various CTF☆217Sep 2, 2025Updated 8 months ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆797Apr 29, 2026Updated 2 weeks ago
- IDA Terminal☆19Feb 27, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- machine check exploitation☆57Aug 6, 2025Updated 9 months ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 9 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71May 6, 2019Updated 7 years ago
- A Play Ground for learning Kernel.☆11May 3, 2026Updated 2 weeks ago
- GEF - GDB Enhanced Features - bata24's fork☆647May 9, 2026Updated last week
- small cute utils for kernel challenges☆40Apr 23, 2024Updated 2 years ago
- ☆14Apr 27, 2020Updated 6 years ago
- ☆15Oct 18, 2024Updated last year
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Signature libraries for Binary Ninja☆16Mar 18, 2020Updated 6 years ago
- A Linux Kernel Exploitation C Library☆20Oct 29, 2025Updated 6 months ago
- A/D CTF services developed for ECSC 2022☆13Nov 11, 2022Updated 3 years ago
- ☆30Nov 30, 2024Updated last year
- Python script written to help take the keys, and other possibly useful data, from a dumped Wii U OTP.bin.☆12Jan 2, 2024Updated 2 years ago
- A Virtual World Platform for the future☆10Nov 13, 2023Updated 2 years ago
- pwndbg configuration to use tmux panes☆14Jan 15, 2025Updated last year
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- IDA plugin to aid with Swift reverse engineering☆39Oct 26, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Sep 13, 2023Updated 2 years ago
- pwninit - automate starting binary exploit challenges☆1,096Dec 7, 2025Updated 5 months ago
- How to use LLVM passes☆37May 25, 2022Updated 3 years ago
- A tool collection of various attacks on TLS based on TLS-Attacker☆24Jun 25, 2025Updated 10 months ago
- ☆12Jun 20, 2023Updated 2 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated 2 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆95Oct 20, 2025Updated 6 months ago