a0xnirudh / Exploits-and-Scripts
The collection of all Python program from various CTF's
☆26Updated 9 years ago
Alternatives and similar repositories for Exploits-and-Scripts
Users that are interested in Exploits-and-Scripts are comparing it to the libraries listed below
Sorting:
- Personal repository for all ctf related stuffs☆67Updated 6 months ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆39Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- The Ultimate Guide to Pwning☆57Updated 7 years ago
- various CTF writeups☆60Updated 6 years ago
- ☆21Updated 6 years ago
- ☆42Updated 6 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- ☆12Updated 6 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago