a repo of links to useful writeups of pwn challenges
☆31Jul 22, 2018Updated 7 years ago
Alternatives and similar repositories for useful-pwn-writeups
Users that are interested in useful-pwn-writeups are comparing it to the libraries listed below
Sorting:
- ☆28Aug 26, 2021Updated 4 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 3 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/it-sec-catalog,new version: https://it-sec-catalog.info/.☆39Apr 24, 2015Updated 10 years ago
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 4 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- Fix API against Themida API Redirection/Jump Trick with Cheat Engine Lua Script☆31Jun 23, 2020Updated 5 years ago
- ☆29May 1, 2020Updated 5 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- ☆29Nov 4, 2020Updated 5 years ago
- ☆22Sep 17, 2019Updated 6 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆30Feb 12, 2026Updated 3 weeks ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- CVE-2020–14882 by Jang☆29Oct 29, 2020Updated 5 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- ☆159Jul 20, 2019Updated 6 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆105Dec 9, 2019Updated 6 years ago
- A tool pulls loaded binaries ordered by memory regions☆35Sep 27, 2019Updated 6 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43May 26, 2019Updated 6 years ago
- Useful tips by OTA CTF members☆151Oct 5, 2019Updated 6 years ago
- Git folder digger, I'm sure it's worthwhile stuff.☆38Jan 10, 2021Updated 5 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Disk scheduling GUI program☆11Jun 22, 2022Updated 3 years ago
- Tools for unpacking and repacking firmware images for the Insta360 X3☆11Sep 19, 2023Updated 2 years ago