blue-hens / beginner_guide_to_pwnView external linksLinks
how to get a few pwn points if you don't know how to pwn
☆29Jul 6, 2019Updated 6 years ago
Alternatives and similar repositories for beginner_guide_to_pwn
Users that are interested in beginner_guide_to_pwn are comparing it to the libraries listed below
Sorting:
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Dec 18, 2023Updated 2 years ago
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- ☆14Jan 20, 2026Updated 3 weeks ago
- ☆39Dec 10, 2024Updated last year
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- picoCTF 2024 Writeup (Capture the Flag Competition) with the solutions for the challenges.☆57Nov 27, 2025Updated 2 months ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- aliyun-chatpt是基于最近较火的chatgpt开发的一个项目,本项目代码十分简单, 通过简单调用openai的接口来实现功能☆12Mar 23, 2023Updated 2 years ago
- Programmers Editor that grows with you☆12Jan 16, 2025Updated last year
- ☆10Apr 13, 2025Updated 10 months ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Sep 16, 2024Updated last year
- Python package for generating Linux iptables configurations.☆10Jul 1, 2021Updated 4 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 5 months ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆35Sep 8, 2025Updated 5 months ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- Automation for the rev/pwn experience in GDB☆14Feb 19, 2024Updated last year
- ☆15Updated this week
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Full Stack E-Commerce + Dashboard & CMS offers a comprehensive solution for e-commerce businesses, providing a feature-rich admin portal …☆14Oct 19, 2024Updated last year
- GreyHack Vim implementation☆12Jan 1, 2024Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- A collection of challenges I made for CTF competitions☆18Jan 28, 2026Updated 2 weeks ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- A list of curated papers focusing on Network Protocol Fuzzing.☆12Jul 5, 2022Updated 3 years ago
- Example Code for Fundamentals of ML for Software Engineers☆16Dec 18, 2024Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Redis可视化web管理平台,支持Redis Cluster集群、Codis、阿里和腾讯云Redis的运维管理以及基本的数据操作☆14Aug 20, 2024Updated last year
- My solution to UCB CS61A course SICP-Python Lab HomeWork & Project☆11Oct 20, 2021Updated 4 years ago
- This repository contains official source code and writeups for challenges from World Wide CTF 2024 - https://ctftime.org/event/2572☆12Dec 19, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Back, back, back in time... before there were fancy schmanzy web GUIs... along came SATAN.☆13Jul 10, 2015Updated 10 years ago
- 这是我在阅读《x86汇编语言 从实模式到保护模式》对每一章节代码的理解,并注释了部分代码☆10Nov 26, 2019Updated 6 years ago
- 🎭Pool MKR tokens to auction voting power to the highest bidder.☆12Aug 14, 2022Updated 3 years ago