Here records some tips about pwn.
☆12Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-pwn-tips
Users that are interested in CTF-pwn-tips are comparing it to the libraries listed below
Sorting:
- ast-walker is golang ast walk helper tool.☆14Feb 13, 2017Updated 9 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Sep 26, 2016Updated 9 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Example Charts in React with D3☆16Jan 24, 2017Updated 9 years ago
- Gallium Operating System☆13Nov 28, 2025Updated 3 months ago
- A basic PE bootloader☆15Oct 21, 2023Updated 2 years ago
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Apr 15, 2019Updated 6 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- ☆23Aug 5, 2025Updated 7 months ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- HN Security's advisories.☆22Nov 7, 2025Updated 4 months ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Git version control tutorial.☆14Aug 7, 2020Updated 5 years ago
- ☆13May 16, 2019Updated 6 years ago
- ☆27Nov 30, 2024Updated last year
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Mar 9, 2019Updated 7 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Fixed memory overflow issue in ProcessHider.☆16May 27, 2018Updated 7 years ago
- ☆14Feb 7, 2019Updated 7 years ago
- Prevent CSRF with nginx☆14Mar 6, 2019Updated 7 years ago
- 🦀 An example of how to package an actix-web project into a Docker container.☆19Jul 18, 2024Updated last year
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆39Jun 8, 2020Updated 5 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- ☆15Jan 2, 2019Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- win7 apc注入不支持win10☆18Mar 29, 2019Updated 6 years ago
- ☆17Sep 15, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago