guyinatuxedo / ShogunLinks
☆101Updated last year
Alternatives and similar repositories for Shogun
Users that are interested in Shogun are comparing it to the libraries listed below
Sorting:
- various docs (that are interesting, or not, depending on the point of view...)☆119Updated last year
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- A full English version of the popular ctf-wiki☆98Updated last year
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆48Updated this week
- My notes on pwn☆287Updated this week
- ☆165Updated 3 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆55Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆72Updated last week
- 'Ike: A binary exploitation and reversing handbook.☆82Updated 6 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆339Updated 4 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆516Updated this week
- A tool for automating setup of kernel pwn challenges☆61Updated 2 months ago
- Write-ups for various CTF☆192Updated last year
- Easily debug processes running in docker containers☆22Updated last year
- Resources to getting started vulnerability research on IoT/embedded devices.☆70Updated last week
- ☆325Updated last year
- ☆13Updated last month
- ASLR bypass without infoleak☆162Updated 3 years ago
- FSOP Again☆24Updated 3 years ago
- Runs exploits, fast.☆86Updated last year
- knowledge is power☆221Updated last month
- A Pythonic Ghidra standard library☆174Updated 3 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆219Updated last year
- Windows Pwnable Study☆370Updated last month
- ☆21Updated last month
- ☆45Updated last year
- 🐍 Solving CTF challenges using Z3 and Python☆60Updated 2 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆222Updated last year
- Udemy – Linux Heap Exploitation☆45Updated 4 years ago