Exploit Development, Reverse Engineering & Cryptography
☆256Feb 26, 2026Updated last month
Alternatives and similar repositories for pwnshop
Users that are interested in pwnshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- Reversing list☆149Jan 9, 2024Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Jun 22, 2023Updated 2 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- esoteric☆57Sep 9, 2020Updated 5 years ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- fireELF - Fileless Linux Malware Framework☆680Apr 17, 2019Updated 6 years ago
- Go package that aids in binary analysis and exploitation☆178Jul 17, 2021Updated 4 years ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Blazefox exploits for Windows 10 RS5 64-bit.☆151Dec 9, 2019Updated 6 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,177Feb 25, 2023Updated 3 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆404Jun 6, 2020Updated 5 years ago
- a simple reverse connected bot in golang.☆17Jun 14, 2022Updated 3 years ago
- A tool for finding the one gadget RCE in libc☆76May 30, 2020Updated 5 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆142Oct 28, 2021Updated 4 years ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Oct 28, 2021Updated 4 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆230Jul 30, 2020Updated 5 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago
- Exploitation and Mitigation Slides☆136Jun 4, 2024Updated last year
- My own collection of Frida scripts and tricks☆69May 28, 2021Updated 4 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,553Jan 13, 2022Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- OSEE Preparation☆191Feb 15, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆17Jul 26, 2018Updated 7 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Oct 3, 2021Updated 4 years ago
- awesome list of browser exploitation tutorials☆2,272Sep 18, 2023Updated 2 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,162Nov 14, 2020Updated 5 years ago
- Vulnerability examples.☆412Jan 27, 2026Updated 2 months ago
- Obfuscate specific windows apis with different apis☆1,024Feb 21, 2021Updated 5 years ago