The collection of all Python program from various CTF's
☆26Oct 11, 2015Updated 10 years ago
Alternatives and similar repositories for Exploits-and-Scripts
Users that are interested in Exploits-and-Scripts are comparing it to the libraries listed below
Sorting:
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- ☆11Aug 21, 2016Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ida插件☆31Feb 29, 2016Updated 10 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Jul 8, 2022Updated 3 years ago
- A simple way to write CS:GO cheats!☆17Sep 1, 2016Updated 9 years ago
- Clone of the IDAPython repo☆23Mar 16, 2015Updated 10 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- ☆12May 13, 2020Updated 5 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Feb 20, 2014Updated 12 years ago
- Python script which extracts procedures from IDA Win32 LST files and converts them to correctly dynamically linked compilable Visual C++ …☆28Jul 10, 2009Updated 16 years ago
- Software Security course☆23Mar 6, 2015Updated 10 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆29May 10, 2020Updated 5 years ago
- ☆34Mar 31, 2019Updated 6 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- IDA Python Scripts☆45Jul 19, 2009Updated 16 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Create PDA Account In Solana☆10Dec 29, 2021Updated 4 years ago
- A serious attempt to implement multi-threading to nmap module, which would result in faster scanning speed. I know that one can write NSE…☆27Oct 13, 2018Updated 7 years ago
- Lua scripts for AIMWARE Counter Strike: Global Offensive hack.☆31Jun 14, 2020Updated 5 years ago
- python script to merge two apk into one☆30Jul 8, 2015Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- using python to hack☆32Mar 29, 2016Updated 9 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- Python library for interacting with the E2E encrypted Hulu API☆35Dec 27, 2019Updated 6 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- A deobfuscator for PjOrion, python cfg generator and more☆78Jul 10, 2017Updated 8 years ago