alanvivona / pwnshop
Exploit Development, Reverse Engineering & Cryptography
☆246Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for pwnshop
- ☆177Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- a summary of linux rootkits published on GitHub☆168Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆367Updated 3 years ago
- ☆294Updated 2 years ago
- Collection of resources for my preparation to take the OSEE certification.☆219Updated 4 years ago
- How to build an efficient pwn development environment in 2020☆258Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆317Updated last year
- Vulnerability examples.☆399Updated 6 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆139Updated 3 years ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆92Updated 3 months ago
- A bunch of my exploit development helper tools, collected in one place.☆139Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆415Updated 2 years ago
- A LKM rootkit for most newer kernel versions.☆169Updated 7 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- Reversing list☆144Updated 10 months ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- Injects additional machine instructions into various binary formats.☆271Updated 9 months ago
- collect for learning cases☆568Updated 5 months ago
- A collection of pwn/CTF related utilities for Ghidra☆660Updated 2 months ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆382Updated last year
- Code for my 0x00sec.org posts☆313Updated 4 years ago
- A Binary Ninja plugin for vulnerability research.☆281Updated 2 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆390Updated 4 years ago
- OSEE Preparation☆171Updated 5 years ago
- Exploitation and Mitigation Slides☆127Updated 5 months ago
- A happy heap editor to support your exploitation process☆194Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 3 years ago