☆13Oct 15, 2018Updated 7 years ago
Alternatives and similar repositories for pwn_challs
Users that are interested in pwn_challs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- Wordpress Plugins List☆25Jun 17, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆16Jan 5, 2020Updated 6 years ago
- ☆52Mar 13, 2026Updated 3 weeks ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- Encrypt jekyll-posts with AES☆24Apr 7, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Toy project for static analysis of ELF binaries☆29Jun 24, 2017Updated 8 years ago
- A LaTeX template for a Coventry University Thesis, based on a Cambridge University Engineering Department template.☆12Sep 14, 2025Updated 6 months ago
- ☆11Apr 30, 2021Updated 4 years ago
- ☆135Dec 15, 2019Updated 6 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 6 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28May 5, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 5 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- Saleae JTAG Analyzer☆18Mar 27, 2026Updated 2 weeks ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆62Nov 9, 2023Updated 2 years ago
- ☆11Oct 19, 2018Updated 7 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- It is a note about security on nodejs☆47Jul 16, 2018Updated 7 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13May 9, 2017Updated 8 years ago
- ☆63May 31, 2024Updated last year
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆19Mar 18, 2019Updated 7 years ago
- ctfs-2019☆12Nov 29, 2019Updated 6 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 3 months ago
- ☆26Feb 24, 2022Updated 4 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆21Jul 2, 2023Updated 2 years ago