guyinatuxedo / Shogun
☆85Updated 10 months ago
Alternatives and similar repositories for Shogun:
Users that are interested in Shogun are comparing it to the libraries listed below
- ☆160Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆105Updated last year
- Write-ups for various CTF☆186Updated last year
- A full English version of the popular ctf-wiki☆89Updated 8 months ago
- A tool for automating setup of kernel pwn challenges☆55Updated 3 months ago
- 'Ike: A binary exploitation and reversing handbook.☆74Updated last month
- RE / Binary Exploitation Resources☆70Updated 7 years ago
- My notes on pwn☆275Updated 2 months ago
- ☆45Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆441Updated this week
- Collection of browser challenges☆126Updated 3 years ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- ☆17Updated last month
- Automatic tool to quickly start a pwn CTF challenge☆42Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆145Updated 4 months ago
- Runs exploits, fast.☆80Updated 7 months ago
- Python library for CTFer☆134Updated this week
- list of organizations offering vulnerability research/reverse engineering jobs☆61Updated 7 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆51Updated last year
- Resources to getting started vulnerability research on IoT/embedded devices.☆43Updated last month
- 🐍 Solving CTF challenges using Z3 and Python☆55Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 2 years ago
- ☆168Updated last month
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆307Updated 2 years ago
- Udemy – Linux Heap Exploitation☆38Updated 3 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆37Updated last year
- FSOP Again☆18Updated 2 years ago