guyinatuxedo / Shogun
☆84Updated 9 months ago
Alternatives and similar repositories for Shogun:
Users that are interested in Shogun are comparing it to the libraries listed below
- various docs (that are interesting, or not, depending on the point of view...)☆102Updated last year
- ☆159Updated 2 years ago
- RE / Binary Exploitation Resources☆69Updated 7 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- A full English version of the popular ctf-wiki☆85Updated 7 months ago
- ☆45Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆434Updated this week
- 'Ike: A binary exploitation and reversing handbook.☆73Updated last month
- 🐍 Solving CTF challenges using Z3 and Python☆55Updated last year
- Write-ups for various CTF☆185Updated 11 months ago
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆307Updated 2 years ago
- My notes on pwn☆274Updated last month
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆51Updated last year
- ☆167Updated last week
- ASLR bypass without infoleak☆158Updated 3 years ago
- Python library for CTFer☆133Updated 3 weeks ago
- FSOP Again☆18Updated 2 years ago
- ☆314Updated 8 months ago
- A tool for automating setup of kernel pwn challenges☆53Updated 3 months ago
- Easily debug processes running in docker containers☆22Updated 7 months ago
- ☆43Updated 3 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆62Updated 7 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆40Updated 2 weeks ago
- Set of pre-generated pwn.college challenges☆64Updated 2 years ago
- Collection of browser challenges☆121Updated 3 years ago
- I will upload challenges I create for various ctf's or educational purposes here.☆23Updated 2 years ago
- Collection of pwn techniques☆28Updated 3 years ago
- knowledge is power☆209Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆142Updated 3 months ago