cyanpencil / PokeCTFLinks
A quick-and-easy web CTF platform for people who love ASCII and minimalism.
☆13Updated 4 years ago
Alternatives and similar repositories for PokeCTF
Users that are interested in PokeCTF are comparing it to the libraries listed below
Sorting:
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 5 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆190Updated last year
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- ☆109Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆229Updated 4 years ago
- A happy heap editor to support your exploitation process☆196Updated 4 years ago
- repository for kernel exploit practice☆406Updated 5 years ago
- angr tutorial for ctf☆154Updated 4 years ago
- ☆26Updated 3 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆197Updated 3 years ago
- Frida-based general purpose fuzzer☆219Updated 4 years ago
- Basic pwntools for Windows☆268Updated 2 years ago
- A fuzzing introspection tool☆167Updated 4 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆153Updated 6 years ago
- ☆30Updated 2 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 6 months ago
- Automatic ROPChain Generation☆291Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆302Updated 2 years ago
- ☆188Updated 4 months ago
- Kernel development & exploitation practice environment.☆233Updated last year
- ☆98Updated 2 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 3 years ago
- ☆48Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆123Updated 8 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago