Schwartzblat / pork_ctfLinks
☆18Updated 8 months ago
Alternatives and similar repositories for pork_ctf
Users that are interested in pork_ctf are comparing it to the libraries listed below
Sorting:
- A research paper about the internals of memory management and heap exploitation☆27Updated 2 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆22Updated 8 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆558Updated last week
- A Python library to debug binary executables, your own way.☆279Updated last week
- Windows Pwnable Study☆385Updated 4 months ago
- Automatic tool to quickly start a pwn CTF challenge☆45Updated 2 years ago
- kernel-pwn and writeup collection☆669Updated 2 years ago
- ☆48Updated 3 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆705Updated last month
- ropr with some tweaks for better linux kernel support☆31Updated 6 months ago
- ☆172Updated 3 years ago
- ☆12Updated 3 months ago
- Write-ups for various CTF☆199Updated 2 months ago
- knowledge is power☆229Updated 2 months ago
- Python snippets for Ghidra's Program and Decompiler APIs☆850Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆235Updated last year
- My notes on pwn☆288Updated 2 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- An updated collection of resources targeting browser-exploitation.☆819Updated 4 years ago
- Kernel development & exploitation practice environment.☆239Updated 2 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆708Updated 2 weeks ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆87Updated 2 weeks ago
- ☆252Updated 2 years ago
- VirtuAlization GDb integrations in pwntools☆36Updated last month
- PAWNYABLE!☆219Updated last year
- ☆113Updated last year
- ☆13Updated 4 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆227Updated last year
- Collection of browser challenges☆138Updated 4 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22Updated 3 years ago