kpcyrd / defcon26-pow
Fast defcon 26 quals pow solver
☆25Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for defcon26-pow
- ☆25Updated 4 years ago
- Binary (In)security tool☆23Updated 5 months ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- kprochide is an LKM for hiding processes from the userland. The module is able to hide multiple processes and is able to dynamically rece…☆20Updated 4 years ago
- Rust crate for r2pipe☆45Updated last year
- Bruteforce with a stream of permutations of a specific pattern☆26Updated 2 months ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆36Updated 4 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- tamper resistant audit log☆18Updated 6 years ago
- The Ultimate Guide to Pwning☆58Updated 6 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆50Updated 4 years ago
- General Research Repository - Only updated when I feel like it☆28Updated last month
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago
- yet another dirbuster☆19Updated 3 years ago
- CLI tool to analyze PE files☆84Updated last month
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 months ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆35Updated 6 years ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- ☆35Updated 12 years ago
- Writeup for the OverTheWire Advent Bonanza 2019 CTF (https://advent2019.overthewire.org/)☆14Updated 4 years ago
- Command-line tool that breaks rotating-xor (and similar) ciphertexts☆93Updated 3 years ago
- Damn vulnerable linux device driver for people to play with.☆27Updated 4 years ago
- Linkable sandbox explorer☆78Updated last year
- Organise and access data collected during internal network pentests☆8Updated 4 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 6 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago