☆177Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for remenissions
Users that are interested in remenissions are comparing it to the libraries listed below
Sorting:
- ☆2,934Feb 8, 2026Updated last month
- pwninit - automate starting binary exploit challenges☆1,077Dec 7, 2025Updated 3 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,300Updated this week
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Feb 23, 2026Updated 2 weeks ago
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆65Apr 3, 2022Updated 3 years ago
- ☆28Aug 26, 2021Updated 4 years ago
- ☆1,106Mar 14, 2024Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- ☆111Dec 30, 2019Updated 6 years ago
- Upcoming list of ctfs directly in your terminal!☆16Apr 17, 2023Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆251Jul 17, 2024Updated last year
- Use angr in Ghidra☆620Jul 29, 2024Updated last year
- Useful tips by OTA CTF members☆151Oct 5, 2019Updated 6 years ago
- A docker environment for pwn in ctf☆803Sep 15, 2025Updated 5 months ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- Writeups for CTF challenges☆21Dec 12, 2023Updated 2 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- the rounding error tool 🚩☆14May 16, 2025Updated 9 months ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆475Aug 3, 2023Updated 2 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Format string exploitation helper☆46Nov 16, 2015Updated 10 years ago
- Build a database of libc offsets to simplify exploitation☆1,854Oct 23, 2024Updated last year
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆48Jun 5, 2022Updated 3 years ago
- A collection of pwn/CTF related utilities for Ghidra☆702Sep 10, 2024Updated last year
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- ☆45Sep 7, 2025Updated 6 months ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago