Automatic tool to quickly start a pwn CTF challenge
☆45Nov 3, 2023Updated 2 years ago
Alternatives and similar repositories for spwn
Users that are interested in spwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a command line tool that let you express commands in natural language using openai api..☆39Dec 4, 2025Updated 4 months ago
- A Python library to debug binary executables, your own way.☆299Apr 7, 2026Updated last week
- Kernel PWN Tooklkit aimed mainly for CTF players☆18Jul 31, 2024Updated last year
- A python module to facilitate gdb scripting☆10Jan 12, 2023Updated 3 years ago
- Fast and flexible challenge downloader for all major CTF platforms☆14Oct 20, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆91Feb 21, 2026Updated last month
- Fingerprinting TCP/IP☆34Jul 8, 2024Updated last year
- 📡🐧 Linux kernel syscall implementation tracker☆270Oct 2, 2025Updated 6 months ago
- Write-ups for various CTF☆216Sep 2, 2025Updated 7 months ago
- IDA Terminal☆18Feb 27, 2026Updated last month
- machine check exploitation☆56Aug 6, 2025Updated 8 months ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 9 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71May 6, 2019Updated 6 years ago
- small cute utils for kernel challenges☆40Apr 23, 2024Updated last year
- GEF - GDB Enhanced Features - bata24's fork☆641Updated this week
- ☆13Apr 27, 2020Updated 5 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆791Mar 27, 2026Updated 3 weeks ago
- ☆16Oct 18, 2024Updated last year
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- Signature libraries for Binary Ninja☆16Mar 18, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A/D CTF services developed for ECSC 2022☆13Nov 11, 2022Updated 3 years ago
- ☆28Nov 30, 2024Updated last year
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- Competitive Programming Template Booklet of Sapienza University of Rome.☆16Nov 11, 2024Updated last year
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Sep 13, 2023Updated 2 years ago
- Proof-of-concept for the ZombieLoad and RIDL attacks☆29May 26, 2019Updated 6 years ago
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 9 months ago
- ☆12Jun 20, 2023Updated 2 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Oct 20, 2025Updated 5 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Mar 21, 2023Updated 3 years ago
- A WiiU homebrew/app for testing the DRC and see some hidden values☆12Sep 18, 2019Updated 6 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆23Jun 11, 2021Updated 4 years ago
- ☆17Nov 13, 2023Updated 2 years ago