a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.
☆1,564Feb 11, 2024Updated 2 years ago
Alternatives and similar repositories for pocorgtfo
Users that are interested in pocorgtfo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concepts (PE, PDF...)☆1,541Dec 22, 2024Updated last year
- documentations, slides decks...☆827May 4, 2024Updated last year
- Hash collisions and exploitations☆3,354Feb 20, 2025Updated last year
- File formats dissections and more...☆11,434Feb 18, 2024Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,584Mar 26, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of links related to Linux kernel security and exploitation☆6,408Mar 7, 2026Updated last month
- Course materials for Modern Binary Exploitation by RPISEC☆5,964Dec 9, 2021Updated 4 years ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,093Mar 26, 2026Updated 3 weeks ago
- A powerful and user-friendly binary analysis platform!☆8,609Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆23,447Updated this week
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,319Updated this week
- CTF framework and exploit development library☆13,360Apr 7, 2026Updated last week
- Free and Open Source Reverse Engineering Platform powered by rizin☆18,663Apr 8, 2026Updated last week
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,323Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,402Dec 16, 2025Updated 4 months ago
- ☆683Mar 25, 2025Updated last year
- A collection of resources for linux reverse engineering☆2,080Jun 2, 2022Updated 3 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,539Mar 20, 2026Updated 3 weeks ago
- A Coverage Explorer for Reverse Engineers☆2,535Feb 14, 2026Updated 2 months ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆733Apr 30, 2020Updated 5 years ago
- Ghidra is a software reverse engineering (SRE) framework☆67,157Updated this week
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆422Mar 20, 2022Updated 4 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆745Nov 1, 2024Updated last year
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,243Nov 24, 2024Updated last year
- LIEF - Library to Instrument Executable Formats (C++, Python, Rust)☆5,369Updated this week
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 6 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,986Feb 24, 2025Updated last year
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,751Jun 3, 2024Updated last year
- Ephemera and other documentation associated with the 1337list project.☆396Jun 14, 2018Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,631Apr 9, 2026Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…