akiym / akitoolsLinks
☆13Updated 6 months ago
Alternatives and similar repositories for akitools
Users that are interested in akitools are comparing it to the libraries listed below
Sorting:
- ☆16Updated 8 years ago
- ☆113Updated 8 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Updated 6 years ago
- Kernel debugger using Timeless Debugging method.☆74Updated 8 years ago
- Some stuffs for CODE BLUE 2016☆23Updated 9 years ago
- ShiftCrops pwn tool☆15Updated 9 years ago
- A x86 systematic ROP payload generation☆57Updated 5 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆14Updated 9 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Updated 6 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Updated 10 years ago
- ☆21Updated 9 years ago
- Cross debugger suite☆20Updated 4 years ago
- Some stuff for CTF.☆10Updated 6 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Code samples used for the blog post☆24Updated 9 years ago
- Simple hash-mining c library and its python binding.☆64Updated 6 years ago
- ☆57Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 9 years ago
- PEDA - Python Exploit Development Assistance for GDB☆95Updated 9 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Updated 6 months ago
- Analyzing Rig Exploit Kit☆49Updated 8 years ago
- Proof of Work generator☆12Updated 6 years ago
- ☆81Updated 8 years ago
- ☆40Updated 8 years ago
- My CTF writeup☆26Updated 8 years ago
- Simple high-interactive client honeypot☆25Updated 8 years ago
- Watching the Flag☆15Updated 10 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Updated 10 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- SECCON2015 online CTF for public☆72Updated 10 years ago