edibledinos / pwnypack
Certified Edible Dinosaurs official CTF toolkit
☆120Updated 6 years ago
Alternatives and similar repositories for pwnypack:
Users that are interested in pwnypack are comparing it to the libraries listed below
- A tool for checking exploitability☆209Updated 5 years ago
- ☆89Updated 6 months ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- ☆82Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 8 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- ☆84Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- ☆85Updated 4 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆103Updated 4 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- PoC for CVE-2015-6086☆68Updated 8 years ago
- Radare 2 wiki☆91Updated 4 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 7 years ago
- hax 'n shit☆118Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- Hodor! Fuzzer..☆128Updated 8 years ago
- fuzz☆125Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆163Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago