MarcoPellero / getlibsLinks
☆15Updated 5 months ago
Alternatives and similar repositories for getlibs
Users that are interested in getlibs are comparing it to the libraries listed below
Sorting:
- Automatic tool to quickly start a pwn CTF challenge☆45Updated 2 years ago
- A Python library to debug binary executables, your own way.☆284Updated last week
- ☆12Updated 3 months ago
- Write-ups for various CTF☆206Updated 2 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆570Updated last week
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆23Updated 9 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆85Updated 3 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆75Updated last year
- ropr with some tweaks for better linux kernel support☆32Updated 6 months ago
- Many-Time Pad Interactive☆178Updated last year
- ☆45Updated 2 years ago
- VirtuAlization GDb integrations in pwntools☆36Updated last week
- kernel-pwn and writeup collection☆672Updated 2 years ago
- ☆18Updated 6 months ago
- My notes on pwn☆289Updated 2 months ago
- pwninit - automate starting binary exploit challenges☆1,023Updated last year
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆139Updated 9 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- Fingerprinting TCP/IP☆33Updated last year
- Coppersmith's method for multivariate polynomials☆189Updated 2 years ago
- Firegex, a firewall for Attack-Defense CTFs☆84Updated last week
- An open-source SBox analysis utility☆18Updated 7 months ago
- Kernel PWN Tooklkit aimed mainly for CTF players☆17Updated last year
- ☆12Updated 2 years ago
- ☆99Updated 7 months ago
- knowledge is power☆229Updated 3 months ago
- Python sandbox escape wiki + payload generator☆131Updated last year
- Network analysis tool for Attack Defence CTF☆400Updated last month
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆239Updated last year
- A pure python tool to implement/exploit the hash length extension attack☆36Updated 2 years ago