Svenito / exploit-pattern
generate and search pattern string for exploit development
☆198Updated last year
Related projects: ⓘ
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆179Updated 7 years ago
- CTF Writeups☆186Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 8 years ago
- Simplify format string exploitation.☆338Updated 2 years ago
- ☆276Updated 4 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆216Updated 3 months ago
- A repository of challenges from various CTF competitions.☆152Updated 10 years ago
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆177Updated 9 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆296Updated last year
- A colleciton of CTF write-ups all using pwntools☆495Updated 7 years ago
- Using Intel's PIN tool to solve CTF problems☆486Updated 4 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆166Updated 5 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆204Updated 5 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆169Updated 6 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago
- Collection of scripts and writeups☆319Updated 2 years ago
- ☆130Updated this week
- 35C3 Junior CTF pwnables☆148Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆499Updated 2 months ago
- A web UI and server for task based competitions employing Etherpad Lite.☆108Updated 5 years ago
- A shellcode writing toolkit☆659Updated 2 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆100Updated 11 months ago
- ☆580Updated last year
- The iCTF Framework, presented by Shellphish!☆329Updated last year
- Payload development framework☆556Updated 3 weeks ago
- How to build an efficient pwn development environment in 2020☆256Updated 3 years ago