Setup for a pwning VM
☆62Nov 3, 2018Updated 7 years ago
Alternatives and similar repositories for pwnvm
Users that are interested in pwnvm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- Open Theori Research Seminar☆18Jun 21, 2019Updated 6 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- Official training ground for the OTA CTF team☆39Dec 7, 2022Updated 3 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- ☆14Aug 25, 2018Updated 7 years ago
- A selection of challenges created for UMDCTF 2017☆23Oct 26, 2019Updated 6 years ago
- Useful tips by OTA CTF members☆153Oct 5, 2019Updated 6 years ago
- Useful tools for CTF competitions☆34Nov 1, 2017Updated 8 years ago
- Web Exploitation Workflow for CTF Challenges☆54Dec 11, 2016Updated 9 years ago
- PHP dengan sintaks berbahasa Indonesia☆14Dec 10, 2017Updated 8 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- ☆30Mar 31, 2017Updated 9 years ago
- Guide to buffer overflows☆60Sep 3, 2021Updated 4 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 4 years ago
- Slack bot for challenge management in large teams☆60Dec 8, 2022Updated 3 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Using LibVMI to detect malware☆32Apr 3, 2022Updated 4 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A framework that help to create CTF Attack with Defense competition quickly☆27Oct 29, 2018Updated 7 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Oct 26, 2022Updated 3 years ago
- ☆17Oct 1, 2024Updated last year
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 8 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Writeups for Pico CTF 2017 capture the flag hacking compeition☆14Mar 21, 2018Updated 8 years ago
- WCTF 2019 Onsite(Master) Challenge☆54Jul 8, 2019Updated 6 years ago
- Indonesia Presidential Election tally form (form C1) reader using deep learning (CNN) and computer vision☆11May 5, 2019Updated 6 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- ☆14Mar 31, 2018Updated 8 years ago