guyinatuxedo / nightmare
☆2,693Updated 8 months ago
Alternatives and similar repositories for nightmare:
Users that are interested in nightmare are comparing it to the libraries listed below
- Tutorials for getting started with Pwntools☆1,444Updated 5 months ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,624Updated 3 years ago
- Linux Binary Exploitation☆1,323Updated 3 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,764Updated 5 years ago
- A sorted and updated list of security wargame sites.☆971Updated last month
- A repository for learning various heap exploitation techniques.☆7,580Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,372Updated 2 years ago
- pwninit - automate starting binary exploit challenges☆922Updated 7 months ago
- CTF framework and exploit development library☆12,417Updated this week
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,707Updated 4 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,928Updated 3 weeks ago
- Reverse engineering focusing on x64 Windows.☆5,336Updated 7 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,461Updated 11 months ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,074Updated last month
- A Course on Intermediate Level Linux Exploitation☆996Updated 4 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,139Updated this week
- A collection of links related to Linux kernel security and exploitation☆5,857Updated 3 weeks ago
- Resources for Windows exploit development☆1,565Updated 3 years ago
- ☆1,384Updated 3 years ago
- A curated list of awesome reversing resources☆4,206Updated last year
- PEDA - Python Exploit Development Assistance for GDB☆5,967Updated 7 months ago
- Challenges for Binary Exploitation Workshop☆604Updated 2 years ago
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,680Updated last year
- Offensive Software Exploitation Course☆2,357Updated last year
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,003Updated last week
- Katana - Automatic CTF Challenge Solver in Python3☆1,290Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,953Updated 2 years ago
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,615Updated 5 months ago
- Course materials for Malware Analysis by RPISEC☆3,821Updated 2 years ago
- Writeups for HacktheBox 'boot2root' machines☆1,943Updated last year