A pwn learning repo containing multiple pwn program codes.
☆35Dec 31, 2025Updated 2 months ago
Alternatives and similar repositories for pwn-learning
Users that are interested in pwn-learning are comparing it to the libraries listed below
Sorting:
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- ☆16Oct 15, 2024Updated last year
- ☆13Feb 24, 2024Updated 2 years ago
- For V8CTF M123☆17Aug 25, 2024Updated last year
- 对脱壳脚本的一些改进☆20Feb 14, 2022Updated 4 years ago
- eastXueLian's reservoir of CTF puzzles.☆15Nov 27, 2024Updated last year
- ☆272Aug 2, 2025Updated 7 months ago
- Collect computer related materials and codes☆20Jan 16, 2026Updated last month
- bpf(2)-based ftrace(1) like function call graph for Go☆26May 5, 2025Updated 10 months ago
- LLDB based debugger for Linux Kernel☆28Apr 5, 2025Updated 11 months ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- A collection of various exploits☆28Sep 17, 2024Updated last year
- ☆34Apr 14, 2025Updated 10 months ago
- Practical fuzzing tutorials and training☆32Jul 15, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- bpf(2)-based ftrace(1)-like function graph tracer for golang processes.☆32Aug 18, 2023Updated 2 years ago
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- 【Android 11-13】为移动热点设置静态 IP☆10Mar 5, 2024Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Feb 5, 2020Updated 6 years ago
- ebpf-based tcpdump☆95Jun 11, 2025Updated 8 months ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- ☆11Oct 17, 2024Updated last year
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- An Implementation of NTQQ Protocol, with Pure C#, Derived from Konata.Core☆13Dec 7, 2025Updated 2 months ago
- Convert the plan generated by Greenplum to dot☆12Jul 17, 2020Updated 5 years ago
- ☆11Nov 10, 2025Updated 3 months ago
- Python Telegraph api.☆15Mar 22, 2025Updated 11 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- choose demo☆21Nov 6, 2025Updated 4 months ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- POC for Phantom Attack☆89Aug 10, 2022Updated 3 years ago
- eBPF to achieve TCPIP bypass, TPROXY, etc.☆39Feb 2, 2021Updated 5 years ago