abhisek / pwnworksView external linksLinks
Exploitation challenges for CTF
☆63Feb 13, 2018Updated 8 years ago
Alternatives and similar repositories for pwnworks
Users that are interested in pwnworks are comparing it to the libraries listed below
Sorting:
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆929Nov 15, 2021Updated 4 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- ☆20Sep 25, 2017Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- ☆20Feb 28, 2018Updated 7 years ago
- Git manager for pentesters☆108Jun 4, 2016Updated 9 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- SECCON 2018 Online CTF 27-28 Oct. 2018☆37Nov 4, 2018Updated 7 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated last month
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Sep 17, 2018Updated 7 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Feb 4, 2020Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago