The collection of all Python program from various CTF's
☆26Oct 11, 2015Updated 10 years ago
Alternatives and similar repositories for Exploits-and-Scripts
Users that are interested in Exploits-and-Scripts are comparing it to the libraries listed below
Sorting:
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- ☆77May 3, 2015Updated 10 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 8 months ago
- Compile scripts for PyQt5 (Qt 5.6.0), Python 2.7.11 and MSVC 2013.☆17Jun 26, 2016Updated 9 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- Tutorial on "Modern Optimization Methods in Python"☆18Feb 27, 2016Updated 10 years ago
- ☆11Aug 21, 2016Updated 9 years ago
- FuzzBuilderEx is a system to build seed corpus and fuzzing executables using the test framework automatically.☆14Sep 6, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆56Jul 8, 2022Updated 3 years ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆18Aug 9, 2021Updated 4 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆12Aug 25, 2021Updated 4 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- A proof-of-concept framework for an Android anti-virus/security engine.☆24May 3, 2013Updated 12 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago