Tzaoh / pwningView external linksLinks
RE / Binary Exploitation Resources
☆74Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for pwning
Users that are interested in pwning are comparing it to the libraries listed below
Sorting:
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆104Aug 31, 2021Updated 4 years ago
- won't maintain☆132Mar 4, 2019Updated 6 years ago
- Use a local instance of retdec to decompile functions in radare2☆21Dec 3, 2021Updated 4 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- ☆22Dec 1, 2025Updated 2 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 6 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- A plugin for the commercial IDA Pro disassembler that warns users if they leave their instance idling for too long.☆30Feb 17, 2021Updated 4 years ago
- ☆264Jul 4, 2023Updated 2 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆14Jan 9, 2025Updated last year
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 4 years ago
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Super IOCTL Basic Fuzzer☆15Sep 22, 2019Updated 6 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- ☆16Mar 6, 2019Updated 6 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 8 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- A gentle introduction to binary exploitation☆42May 9, 2020Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Feb 8, 2024Updated 2 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago