Schwartzblat / pork_ctfLinks
☆19Updated 11 months ago
Alternatives and similar repositories for pork_ctf
Users that are interested in pork_ctf are comparing it to the libraries listed below
Sorting:
- A research paper about the internals of memory management and heap exploitation☆27Updated 3 years ago
- Automatic tool to quickly start a pwn CTF challenge☆45Updated 2 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆594Updated last week
- Windows Pwnable Study☆394Updated 6 months ago
- kernel-pwn and writeup collection☆683Updated 2 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆27Updated 11 months ago
- A Python library to debug binary executables, your own way.☆294Updated last week
- A plugin to introduce interactive symbols into your debugger from your decompiler☆766Updated last week
- ropr with some tweaks for better linux kernel support☆35Updated 8 months ago
- ☆263Updated 2 years ago
- Write-ups for various CTF☆217Updated 4 months ago
- ☆12Updated 5 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆135Updated 2 years ago
- Script that enables all AB features in WhatsApp Web.☆24Updated last year
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆540Updated 7 months ago
- ctf writeups by the rounding error team ✏️☆34Updated 7 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆723Updated 3 months ago
- ☆48Updated 3 years ago
- Python snippets for Ghidra's Program and Decompiler APIs☆861Updated 2 years ago
- An updated collection of resources targeting browser-exploitation.☆824Updated 4 years ago
- All my public vulnerabilities.☆14Updated 5 years ago
- ☆119Updated last year
- pwninit - automate starting binary exploit challenges☆1,049Updated last month
- FSOP Again☆31Updated 3 years ago
- knowledge is power☆229Updated last week
- Kernel development & exploitation practice environment.☆244Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆249Updated last year
- ☆659Updated 9 months ago
- ☆13Updated 6 months ago
- Reverse Engineering challenges☆36Updated 5 years ago