Easily debug processes running in docker containers
☆29Jun 22, 2024Updated last year
Alternatives and similar repositories for docker-dbg
Users that are interested in docker-dbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 3 months ago
- demo of common anti-analysis techniques used by malware☆18Nov 16, 2021Updated 4 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆27Jul 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆52Jul 3, 2022Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- ☆16Jan 10, 2025Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- ☆12Apr 28, 2025Updated 11 months ago
- ropr with some tweaks for better linux kernel support☆39Apr 25, 2025Updated 11 months ago
- Best CTF in August 2021!☆18Sep 7, 2021Updated 4 years ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆61Nov 16, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 8 months ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆497Oct 11, 2025Updated 6 months ago
- Write-ups for various CTF☆216Sep 2, 2025Updated 7 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆35Apr 7, 2026Updated last week
- run any binary and augment its output and periods of inactivity with memory usage differentials (LD_PRELOAD hax)☆35Oct 2, 2024Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- Android OTA image analysis preprocessing automation tool.☆10Feb 25, 2023Updated 3 years ago
- ☆190Feb 8, 2025Updated last year
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Python library to automate gdb debugging☆20Jun 26, 2025Updated 9 months ago
- Adobe Reader DC Information Leak Exploit☆23Oct 13, 2022Updated 3 years ago
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- ctf solutions☆81Apr 2, 2024Updated 2 years ago
- CVEs for the Rust standard library☆59Sep 5, 2021Updated 4 years ago
- Collection of pwn techniques☆29Feb 12, 2022Updated 4 years ago
- kernel-pwn and writeup collection☆710Oct 2, 2023Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A memory allocator written in Assembly focused on speed and efficiency, making it fantastic for small programs.☆14Dec 11, 2019Updated 6 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆251Jul 17, 2024Updated last year
- A simple example of using Windows Hypervisor Platform (WHP)☆12Dec 18, 2020Updated 5 years ago
- GEF - GDB Enhanced Features - bata24's fork☆642Apr 5, 2026Updated last week
- ☆11Dec 23, 2018Updated 7 years ago
- E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android☆17Sep 18, 2023Updated 2 years ago