☆129May 3, 2024Updated last year
Alternatives and similar repositories for Shogun
Users that are interested in Shogun are comparing it to the libraries listed below
Sorting:
- ☆2,925Feb 8, 2026Updated 3 weeks ago
- ☆23Sep 10, 2022Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆138Dec 31, 2023Updated 2 years ago
- ☆12Aug 22, 2022Updated 3 years ago
- A full English version of the popular ctf-wiki☆109Jul 6, 2024Updated last year
- FSOP Again☆32Apr 3, 2022Updated 3 years ago
- Write-ups for various CTF☆218Sep 2, 2025Updated 6 months ago
- ☆12Aug 3, 2025Updated 7 months ago
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Jun 13, 2023Updated 2 years ago
- My notes on pwn☆296Jan 12, 2026Updated last month
- ctf writeups by the rounding error team ✏️☆33May 23, 2025Updated 9 months ago
- Common format for transferring and applying function information across binary analysis tools☆60Nov 5, 2025Updated 4 months ago
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers☆55Aug 12, 2025Updated 6 months ago
- Some of the Karen Wagner High School Computer Science Team's Solutions for Past UIL CS Programming Problems.☆11Apr 19, 2024Updated last year
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- ☆103Dec 17, 2025Updated 2 months ago
- pwninit - automate starting binary exploit challenges☆1,072Dec 7, 2025Updated 3 months ago
- Intro to Cybersecurity☆21Feb 17, 2026Updated 2 weeks ago
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆134Jan 26, 2026Updated last month
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- ☆19May 19, 2024Updated last year
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 7 months ago
- ☆25Dec 3, 2024Updated last year
- Assembly code editor☆52Jun 30, 2025Updated 8 months ago
- ☆21Dec 1, 2021Updated 4 years ago
- ☆22Sep 26, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Example of using Windows Platform Binary Table (WPBT)☆27Jul 9, 2023Updated 2 years ago
- An official Rizin package manager☆30Updated this week
- The Decompilation Wiki: info on all things decompilation☆238Feb 26, 2026Updated last week
- The best tool for finding one gadget RCE in libc.so.6☆2,301Feb 26, 2026Updated last week
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International fo…☆22Jul 30, 2020Updated 5 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Python library for CTFer☆174Feb 11, 2026Updated 3 weeks ago
- Code snippets for Binary Ninja's Python API☆32Jun 2, 2021Updated 4 years ago
- Image Processing and Deep Learning algorithm to detect leopards from a live camera feed.☆10Mar 25, 2023Updated 2 years ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 8 months ago