☆40Feb 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for OnePunch
Users that are interested in OnePunch are comparing it to the libraries listed below
Sorting:
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- ☆19May 23, 2019Updated 6 years ago
- ☆11Sep 1, 2023Updated 2 years ago
- ☆28Dec 17, 2025Updated 2 months ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.☆19May 12, 2025Updated 9 months ago
- ☆37Nov 16, 2023Updated 2 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Jun 28, 2024Updated last year
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- linux kernel cross page attack demo module☆31Mar 15, 2023Updated 2 years ago
- ☆32Apr 14, 2023Updated 2 years ago
- Script to setup pwn environment with Docker☆47Jan 10, 2026Updated last month
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- derper's mom☆13Oct 28, 2025Updated 4 months ago
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- ReCopilot IDA☆49Jan 12, 2026Updated last month
- ☆298Jun 21, 2022Updated 3 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆119Jan 9, 2023Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- ☆51Jan 25, 2022Updated 4 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- collections of container escape techniques 🐿☆72Mar 23, 2021Updated 4 years ago
- Replace gdb default history searcher and auto complete with fzf fuzzy finder☆25Apr 14, 2023Updated 2 years ago
- VTable dumper for IDA 7.7+☆18Jun 19, 2025Updated 8 months ago
- ida pro collapse plugin☆30Jul 26, 2023Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- WCTF 2019 Onsite(Master) Challenge☆53Jul 8, 2019Updated 6 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- ☆34Jun 11, 2024Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago