Here records some tips about pwn.
☆12Mar 28, 2021Updated 5 years ago
Alternatives and similar repositories for CTF-pwn-tips
Users that are interested in CTF-pwn-tips are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 21, 2021Updated 5 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- A basic PE bootloader☆15Oct 21, 2023Updated 2 years ago
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- 御剑算号破解激活工具☆12Mar 20, 2019Updated 7 years ago
- ☆12Apr 29, 2019Updated 7 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Apr 15, 2019Updated 7 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆23Aug 5, 2025Updated 8 months ago
- algorithm for word square construction and the first proper English 10-square☆18May 13, 2023Updated 2 years ago
- Champion at Brainhack TIL 2022: Team 8000SGD_CAT☆13Apr 6, 2024Updated 2 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- HN Security's advisories.☆22Nov 7, 2025Updated 5 months ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆23Jun 20, 2025Updated 10 months ago
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 7 months ago
- Telegram Bot to flash and test PineTime firmware remotely☆25Nov 23, 2020Updated 5 years ago
- ☆13May 16, 2019Updated 6 years ago
- ☆29Nov 30, 2024Updated last year
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Fixed memory overflow issue in ProcessHider.☆16May 27, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Feb 7, 2019Updated 7 years ago
- Prevent CSRF with nginx☆14Mar 6, 2019Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- My CTF Challenges. No one plays.☆13Dec 4, 2022Updated 3 years ago
- Generates Flowchart-Visualization of Netflix Branch-Manager Data - just an experiment☆11Jan 5, 2019Updated 7 years ago
- ☆15Jan 2, 2019Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago