how to get a few pwn points if you don't know how to pwn
☆29Jul 6, 2019Updated 6 years ago
Alternatives and similar repositories for beginner_guide_to_pwn
Users that are interested in beginner_guide_to_pwn are comparing it to the libraries listed below
Sorting:
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆55Dec 18, 2023Updated 2 years ago
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- IECS213 微處理機系統☆12Dec 12, 2025Updated 2 months ago
- Reverse engineering CTFs.☆66Jan 25, 2026Updated last month
- ☆39Dec 10, 2024Updated last year
- ☆11Dec 15, 2022Updated 3 years ago
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- Programmers Editor that grows with you☆13Jan 16, 2025Updated last year
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆10Apr 13, 2025Updated 10 months ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- 一個關於資訊社群的集散地☆13Sep 17, 2023Updated 2 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- ☆15Updated this week
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆39Nov 30, 2025Updated 3 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆36Sep 8, 2025Updated 6 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Course materials for Malware Analysis by RPISEC☆10May 11, 2017Updated 8 years ago
- GreyHack Vim implementation☆12Jan 1, 2024Updated 2 years ago
- An implementation of the Formality language in C☆13Oct 12, 2019Updated 6 years ago
- 🎭Pool MKR tokens to auction voting power to the highest bidder.☆12Aug 14, 2022Updated 3 years ago
- 这是我在阅读《x86汇编语言 从实模式到保护模式》对每一章节代码的理解,并注释了部分代码☆10Nov 26, 2019Updated 6 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- This repository contains official source code and writeups for challenges from World Wide CTF 2024 - https://ctftime.org/event/2572☆12Dec 19, 2024Updated last year
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- Example Code for Fundamentals of ML for Software Engineers☆16Dec 18, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- ☆13Jul 11, 2024Updated last year