RE / Binary Exploitation Resources
☆73Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for pwning
Users that are interested in pwning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Collection of writeups☆15Sep 26, 2021Updated 4 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- won't maintain☆136Mar 4, 2019Updated 7 years ago
- Use a local instance of retdec to decompile functions in radare2☆22Dec 3, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆22Dec 1, 2025Updated 4 months ago
- ☆264Jul 4, 2023Updated 2 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 31, 2026Updated 3 weeks ago
- A gentle introduction to binary exploitation☆43May 9, 2020Updated 5 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Mar 6, 2019Updated 7 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- New Framework Red Team Operations☆21Jun 7, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆362Jan 4, 2024Updated 2 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆27Jul 19, 2024Updated last year
- ☆20Sep 2, 2021Updated 4 years ago
- Source code and writeups for CSCTF'24!☆19Sep 15, 2024Updated last year
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago