guyinatuxedo / ShogunLinks
☆109Updated last year
Alternatives and similar repositories for Shogun
Users that are interested in Shogun are comparing it to the libraries listed below
Sorting:
- various docs (that are interesting, or not, depending on the point of view...)☆128Updated last year
- A full English version of the popular ctf-wiki☆100Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆537Updated last week
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆57Updated this week
- ☆172Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆85Updated last month
- Resources to getting started vulnerability research on IoT/embedded devices.☆85Updated this week
- My notes on pwn☆288Updated last month
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆350Updated 6 months ago
- ☆328Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- ☆12Updated 3 months ago
- Write-ups for various CTF☆199Updated last month
- Runs exploits, fast.☆93Updated last year
- A Python library to debug binary executables, your own way.☆262Updated last week
- A tool for automating setup of kernel pwn challenges☆60Updated 4 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆228Updated last year
- knowledge is power☆228Updated last month
- FSOP Again☆26Updated 3 years ago
- Windows Pwnable Study☆379Updated 3 months ago
- kernel-pwn and writeup collection☆663Updated 2 years ago
- ctf writeups by the rounding error team ✏️☆35Updated 4 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆84Updated last month
- Udemy – Linux Heap Exploitation☆47Updated 4 years ago
- Kernel development & exploitation practice environment.☆235Updated 2 years ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆10Updated 9 months ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- ☆45Updated 3 weeks ago