guyinatuxedo / Shogun
☆90Updated last year
Alternatives and similar repositories for Shogun:
Users that are interested in Shogun are comparing it to the libraries listed below
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- ☆162Updated 2 years ago
- 'Ike: A binary exploitation and reversing handbook.☆75Updated 3 months ago
- Write-ups for various CTF☆190Updated last year
- A full English version of the popular ctf-wiki☆93Updated 10 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆470Updated this week
- My notes on pwn☆284Updated 3 weeks ago
- Collection of browser challenges☆132Updated 4 years ago
- Python library for CTFer☆142Updated 2 weeks ago
- A tool for automating setup of kernel pwn challenges☆56Updated 5 months ago
- Runs exploits, fast.☆83Updated 9 months ago
- A Python library to debug binary executables, your own way.☆196Updated last week
- ☆177Updated 3 months ago
- ☆46Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆203Updated 9 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆319Updated last month
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆64Updated 4 months ago
- Udemy – Linux Heap Exploitation☆42Updated 3 years ago
- ☆318Updated 10 months ago
- Easily debug processes running in docker containers☆22Updated 10 months ago
- PAWNYABLE!☆208Updated 11 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 5 months ago
- Windows Pwnable Study☆351Updated 4 years ago
- An intuitive query API for IDA Pro☆156Updated last month