MarcoMeinardi / spwnLinks
Automatic tool to quickly start a pwn CTF challenge
☆43Updated last year
Alternatives and similar repositories for spwn
Users that are interested in spwn are comparing it to the libraries listed below
Sorting:
- A Python library to debug binary executables, your own way.☆213Updated this week
- Write-ups for various CTF☆191Updated last year
- VirtuAlization GDb integrations in pwntools☆35Updated 2 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆117Updated last year
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆20Updated 4 months ago
- ropr with some tweaks for better linux kernel support☆20Updated 2 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆491Updated this week
- My personnal repository☆10Updated last year
- ☆11Updated 8 months ago
- Kernel PWN Tooklkit aimed mainly for CTF players☆16Updated 10 months ago
- Python library for CTFer☆143Updated 2 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆212Updated 11 months ago
- ☆13Updated this week
- PAWNYABLE!☆208Updated last year
- A bunch of V8 resources (with a security focus)☆36Updated this week
- kernel-pwn and writeup collection☆625Updated last year
- A tool for automating setup of kernel pwn challenges☆58Updated 3 weeks ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆74Updated last month
- angr tutorial for ctf☆152Updated 4 years ago
- ☆99Updated last year
- ☆164Updated 2 years ago
- a new class of file structure attacks☆50Updated 2 years ago
- Kernel development & exploitation practice environment.☆232Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆80Updated 7 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 6 months ago
- ☆178Updated 4 months ago
- Network analysis tool for Attack Defence CTF☆323Updated 11 months ago
- ☆45Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- small cute utils for kernel challenges☆37Updated last year