guyinatuxedo / remenissionsView external linksLinks
☆179Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for remenissions
Users that are interested in remenissions are comparing it to the libraries listed below
Sorting:
- ☆2,903Feb 8, 2026Updated last week
- pwninit - automate starting binary exploit challenges☆1,062Dec 7, 2025Updated 2 months ago
- img -> txt -> img☆10Dec 4, 2020Updated 5 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,295Feb 3, 2026Updated last week
- kernel-pwn and writeup collection☆693Oct 2, 2023Updated 2 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Sep 10, 2023Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,430Jan 15, 2026Updated last month
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated this week
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆65Apr 3, 2022Updated 3 years ago
- ☆28Aug 26, 2021Updated 4 years ago
- ☆1,101Mar 14, 2024Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆523Jun 28, 2024Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- ☆111Dec 30, 2019Updated 6 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆251Jul 17, 2024Updated last year
- Useful tips by OTA CTF members☆152Oct 5, 2019Updated 6 years ago
- Use angr in Ghidra☆617Jul 29, 2024Updated last year
- A docker environment for pwn in ctf☆797Sep 15, 2025Updated 5 months ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- Writeups for CTF challenges☆21Dec 12, 2023Updated 2 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,817Jun 8, 2019Updated 6 years ago
- ☆11Feb 25, 2025Updated 11 months ago
- A third-party build of Telegram Apps, which remains exactly the same as the official client except raising the limit of number of account…☆10Sep 5, 2024Updated last year
- the rounding error tool 🚩☆14May 16, 2025Updated 8 months ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- ☆21Oct 16, 2020Updated 5 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆475Aug 3, 2023Updated 2 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Build a database of libc offsets to simplify exploitation☆1,852Oct 23, 2024Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆701Sep 10, 2024Updated last year
- Using Intel's PIN tool to solve CTF problems☆508Apr 12, 2020Updated 5 years ago
- ☆45Sep 7, 2025Updated 5 months ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago