Easily debug processes running in docker containers
☆29Jun 22, 2024Updated last year
Alternatives and similar repositories for docker-dbg
Users that are interested in docker-dbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- ☆25Jul 19, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆51Jul 3, 2022Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- ☆17Jan 10, 2025Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- ☆12Apr 28, 2025Updated 10 months ago
- CVE-2021-3707 , CVE-2021-3708☆21Jan 21, 2022Updated 4 years ago
- ropr with some tweaks for better linux kernel support☆38Apr 25, 2025Updated 10 months ago
- Best CTF in August 2021!☆18Sep 7, 2021Updated 4 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆58Nov 16, 2023Updated 2 years ago
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 7 months ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆493Oct 11, 2025Updated 5 months ago
- the rounding error tool 🚩☆14May 16, 2025Updated 10 months ago
- Write-ups for various CTF☆218Sep 2, 2025Updated 6 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated last month
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- ☆10Aug 8, 2020Updated 5 years ago
- ☆16Feb 27, 2026Updated 3 weeks ago
- ☆189Feb 8, 2025Updated last year
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Python library to automate gdb debugging☆20Jun 26, 2025Updated 8 months ago
- Adobe Reader DC Information Leak Exploit☆23Oct 13, 2022Updated 3 years ago
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- ctf solutions☆81Apr 2, 2024Updated last year
- CVEs for the Rust standard library☆59Sep 5, 2021Updated 4 years ago
- Collection of pwn techniques☆29Feb 12, 2022Updated 4 years ago
- kernel-pwn and writeup collection☆705Oct 2, 2023Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- A memory allocator written in Assembly focused on speed and efficiency, making it fantastic for small programs.☆14Dec 11, 2019Updated 6 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆251Jul 17, 2024Updated last year
- A simple example of using Windows Hypervisor Platform (WHP)☆12Dec 18, 2020Updated 5 years ago
- GEF - GDB Enhanced Features - bata24's fork☆629Updated this week