beaujeant / PwnAdventure3View external linksLinks
Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)
☆101Oct 15, 2022Updated 3 years ago
Alternatives and similar repositories for PwnAdventure3
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
Sorting:
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Ruby ALPC Fuzzer ( joke )☆24Oct 12, 2014Updated 11 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- ☆16Jun 4, 2019Updated 6 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆238May 25, 2020Updated 5 years ago
- Java integration for Hex-Rays IDA Pro☆26Feb 15, 2017Updated 9 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- useful crypto resources for CTF competition.☆19Mar 2, 2019Updated 6 years ago
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆11Apr 18, 2017Updated 8 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- writings on anti-reverse engineering.☆290Nov 13, 2021Updated 4 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Jul 21, 2020Updated 5 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆235Sep 9, 2022Updated 3 years ago
- ☆18Feb 6, 2019Updated 7 years ago
- Generate inline assembly functions to wrap your replacement functions. Supports __usercall and __userpurge☆16Jun 16, 2023Updated 2 years ago
- Howto setup a UEFI Development PC.☆10Jan 5, 2026Updated last month
- ☆11Mar 12, 2021Updated 4 years ago
- ☆12Nov 12, 2022Updated 3 years ago