jopraveen / pwnkillerLinks
☆9Updated 2 years ago
Alternatives and similar repositories for pwnkiller
Users that are interested in pwnkiller are comparing it to the libraries listed below
Sorting:
- Gonna share my writeups and resources here☆66Updated 6 months ago
- ☆37Updated 2 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- ☆16Updated 2 years ago
- Some tips for Bug Bounty using LibreOffice☆47Updated 4 months ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆27Updated 2 months ago
- CTF Writeups☆26Updated 11 months ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 5 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- ☆60Updated 3 years ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆25Updated 2 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆54Updated 2 weeks ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Updated 7 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- ☆42Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆45Updated 5 months ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆21Updated this week
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Updated last year
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Updated 3 years ago
- Markov Model libraries, optimized for cracking-focused password generations.☆111Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- My course work about basic binary exploitation.🤿☆7Updated 3 years ago
- Information Security Information From Web☆27Updated 10 months ago
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆18Updated last year
- ☆13Updated 2 years ago