Here records some tips about pwn.
☆12Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-pwn-tips
Users that are interested in CTF-pwn-tips are comparing it to the libraries listed below
Sorting:
- ☆12Apr 29, 2019Updated 6 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Sep 26, 2016Updated 9 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- How to set up OAuth 2.0 from MIT OpenID using Passport.js and selected guides on understanding OAuth 2.0.☆12Jan 21, 2018Updated 8 years ago
- ast-walker is golang ast walk helper tool.☆14Feb 13, 2017Updated 9 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- ☆14Feb 7, 2019Updated 7 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Generates Flowchart-Visualization of Netflix Branch-Manager Data - just an experiment☆11Jan 5, 2019Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Another way to substitute environment variables in shell format strings ${FOO}, designed for k8s stuff☆13Mar 20, 2023Updated 2 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Apr 15, 2019Updated 6 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- 御剑算号破解激活工具☆12Mar 20, 2019Updated 6 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Champion at Brainhack TIL 2022: Team 8000SGD_CAT☆13Apr 6, 2024Updated last year
- Splunk Stuffs!☆13Oct 14, 2023Updated 2 years ago
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Mar 9, 2019Updated 6 years ago
- Index of my personal projects and writing, functionally a CV☆20Feb 4, 2026Updated 3 weeks ago
- ☆12Apr 24, 2019Updated 6 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- ☆17Sep 15, 2017Updated 8 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- An effort to generate a JavaDoc reference for all things related to AoM scripting.☆16Mar 16, 2018Updated 7 years ago
- ☆18May 31, 2022Updated 3 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- ☆22Aug 5, 2025Updated 6 months ago
- a open source rat from china☆12Oct 28, 2016Updated 9 years ago
- ☆15Jan 2, 2019Updated 7 years ago
- ☆13May 16, 2019Updated 6 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Git version control tutorial.☆14Aug 7, 2020Updated 5 years ago