Setup for a pwning VM
☆62Nov 3, 2018Updated 7 years ago
Alternatives and similar repositories for pwnvm
Users that are interested in pwnvm are comparing it to the libraries listed below
Sorting:
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- Official training ground for the OTA CTF team☆39Dec 7, 2022Updated 3 years ago
- Useful tips by OTA CTF members☆152Oct 5, 2019Updated 6 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- Open Theori Research Seminar☆18Jun 21, 2019Updated 6 years ago
- Slack bot for challenge management in large teams☆60Dec 8, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- PHP dengan sintaks berbahasa Indonesia☆14Dec 10, 2017Updated 8 years ago
- Using LibVMI to detect malware☆32Apr 3, 2022Updated 3 years ago
- Web Exploitation Workflow for CTF Challenges☆53Dec 11, 2016Updated 9 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Guide to buffer overflows☆60Sep 3, 2021Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- Reverse Engineering Resources☆232Jun 19, 2018Updated 7 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A simple provider to analyse what gets passed into Microsoft's Anti-Malware Scan Interface☆17Jan 10, 2020Updated 6 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- ☆17Oct 1, 2024Updated last year
- ☆44Oct 16, 2025Updated 4 months ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- HD-audio emulator☆22Apr 7, 2021Updated 4 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago