beaujeant / PwnAdventure3
Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)
☆99Updated 2 years ago
Alternatives and similar repositories for PwnAdventure3:
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
- Setup for a pwning VM☆61Updated 6 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- ☆90Updated 3 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- ☆107Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- DarkNight theme for Ghidra☆125Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 8 months ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- ☆88Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Manage building and deploying exploitation challenges with ease☆58Updated 2 weeks ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 7 years ago
- ☆159Updated 5 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆56Updated 2 years ago
- Exploitation and Mitigation Slides☆128Updated 10 months ago
- ☆88Updated 6 years ago
- ☆99Updated 6 years ago
- Stuff that should be imprinted in the mind☆33Updated 14 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Some kernel exploits☆144Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆203Updated last year
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 7 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago