guyinatuxedo / ShogunLinks
☆118Updated last year
Alternatives and similar repositories for Shogun
Users that are interested in Shogun are comparing it to the libraries listed below
Sorting:
- various docs (that are interesting, or not, depending on the point of view...)☆134Updated last year
- All Files, Scripts, and exploits can be found here☆71Updated 4 years ago
- A full English version of the popular ctf-wiki☆106Updated last year
- ☆178Updated 3 years ago
- My notes on pwn☆290Updated this week
- Runs exploits, fast.☆106Updated 2 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆94Updated 3 weeks ago
- Workshop on firmware reverse engineering☆352Updated 3 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆370Updated 9 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆591Updated last week
- Write-ups for various CTF☆217Updated 3 months ago
- 'Ike: A binary exploitation and reversing handbook.☆89Updated 4 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆249Updated last year
- FSOP Again☆30Updated 3 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆74Updated last week
- ☆330Updated last year
- A Python library to debug binary executables, your own way.☆292Updated last week
- list of organizations offering vulnerability research/reverse engineering jobs☆101Updated 3 months ago
- ropr with some tweaks for better linux kernel support☆35Updated 8 months ago
- ☆13Updated 6 months ago
- Windows Pwnable Study☆394Updated 6 months ago
- Automatic tool to quickly start a pwn CTF challenge☆45Updated 2 years ago
- ASLR bypass without infoleak☆164Updated 4 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Infrastructure powering the pwn.college dojo☆418Updated this week
- Udemy – Linux Heap Exploitation☆54Updated 4 years ago
- ☆45Updated 3 months ago
- 🐍 Solving CTF challenges using Z3 and Python☆62Updated 2 years ago