guyinatuxedo / ShogunLinks
☆112Updated last year
Alternatives and similar repositories for Shogun
Users that are interested in Shogun are comparing it to the libraries listed below
Sorting:
- various docs (that are interesting, or not, depending on the point of view...)☆129Updated last year
- A full English version of the popular ctf-wiki☆103Updated last year
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- 'Ike: A binary exploitation and reversing handbook.☆86Updated 2 months ago
- ☆172Updated 3 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆555Updated last week
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆355Updated 7 months ago
- My notes on pwn☆288Updated last month
- Workshop on firmware reverse engineering☆313Updated last month
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆87Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆165Updated 11 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆93Updated last month
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆59Updated 3 weeks ago
- ☆13Updated 4 months ago
- ☆327Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆235Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- A Pythonic Ghidra standard library☆174Updated 5 months ago
- ☆45Updated last month
- Windows Pwnable Study☆383Updated 4 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Write-ups for various CTF☆199Updated last month
- A tool for automating setup of kernel pwn challenges☆60Updated this week
- knowledge is power☆229Updated 2 months ago
- Runs exploits, fast.☆96Updated 2 weeks ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- A Python library to debug binary executables, your own way.☆274Updated 2 weeks ago
- Udemy – Linux Heap Exploitation☆48Updated 4 years ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆11Updated 10 months ago