VincentDary / PolyAsciiShellGenLinks
Caezar ASCII Shellcode Generator (x86, 32 bits)
☆31Updated 4 years ago
Alternatives and similar repositories for PolyAsciiShellGen
Users that are interested in PolyAsciiShellGen are comparing it to the libraries listed below
Sorting:
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Updated 6 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Updated 6 years ago
- ☆154Updated 6 years ago
- a IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn☆72Updated 2 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Updated 7 years ago
- WCTF 2019 challenge☆103Updated 6 years ago
- Yet another xinetd docker used to build pwnable challenges.☆37Updated 6 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Fuzzing library written in/for python.☆85Updated 5 years ago
- ☆175Updated 6 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆67Updated 4 years ago
- ☆68Updated last year
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆52Updated 5 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆127Updated 8 years ago
- ☆47Updated 6 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆89Updated 6 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- ☆28Updated 2 months ago
- Script to setup pwn environment for CTF with Docker☆155Updated 4 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆48Updated 2 years ago
- qemu vulnerablity.☆54Updated 4 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Updated 6 years ago
- Write-ups about challenges in http://reversing.kr/challenge.php☆47Updated 7 years ago
- ☆72Updated last year
- Some new commands debug heap for peda☆100Updated 7 months ago
- 🔍Heap analysis tool for CTF pwn.☆225Updated 4 years ago
- Build a database of libc offsets to simplify exploitation☆20Updated 9 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago