Schwartzblat / pork_ctfLinks
☆19Updated 6 months ago
Alternatives and similar repositories for pork_ctf
Users that are interested in pork_ctf are comparing it to the libraries listed below
Sorting:
- Automatic tool to quickly start a pwn CTF challenge☆45Updated last year
- A research paper about the internals of memory management and heap exploitation☆25Updated 2 years ago
- A Python library to debug binary executables, your own way.☆252Updated this week
- GEF - GDB Enhanced Features for exploit devs & reversers☆518Updated last week
- Write-ups for various CTF☆192Updated last year
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆20Updated 6 months ago
- ☆12Updated last week
- ropr with some tweaks for better linux kernel support☆22Updated 3 months ago
- Windows Pwnable Study☆370Updated last month
- kernel-pwn and writeup collection☆640Updated last year
- ☆13Updated last month
- various docs (that are interesting, or not, depending on the point of view...)☆119Updated last year
- ☆165Updated 3 years ago
- ☆101Updated last year
- yet another untitled mrhfla☆8Updated 4 years ago
- VirtuAlization GDb integrations in pwntools☆35Updated this week
- A bunch of V8 resources (with a security focus)☆49Updated last month
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆220Updated last year
- ☆238Updated 2 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆666Updated last week
- Runs exploits, fast.☆87Updated last year
- pwninit - automate starting binary exploit challenges☆963Updated last year
- My notes on pwn☆287Updated last week
- knowledge is power☆224Updated this week
- ☆13Updated 5 months ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆519Updated 2 months ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆692Updated 3 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆23Updated last year
- Network analysis tool for Attack Defence CTF☆346Updated last month