更好的包装pwntools,提高编写pwn题exp效率的工具
☆27Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for Autopwn
Users that are interested in Autopwn are comparing it to the libraries listed below
Sorting:
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- ☆20Dec 13, 2021Updated 4 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- RISC-V V Extension Encoder☆11Jul 28, 2022Updated 3 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- For V8CTF M123☆17Aug 25, 2024Updated last year
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- 解决IDA Pro 7.0版本在遇到使用CET技术的ELF文件时符号解析错误的问题☆18Oct 23, 2020Updated 5 years ago
- the metasploit script(POC) about CVE-2021-36260☆19Nov 3, 2021Updated 4 years ago
- Library for manipulating gdb in batch mode☆21Mar 10, 2024Updated last year
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- vulhub下载器,可则需下载对应环境☆23Sep 19, 2018Updated 7 years ago
- ☆31Sep 4, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)☆49Jul 14, 2025Updated 7 months ago
- goby python api site//gobies.org/☆19Nov 16, 2020Updated 5 years ago
- 可以方便地部署一个或者多个pwn题到一个docker容器中(使用chroot,并可以设置是否使用我自己写的catflag程序替换默认的/bin/sh程序,以增加安全性)☆242Nov 25, 2021Updated 4 years ago
- ☆50Feb 14, 2026Updated 3 weeks ago
- WAScan ((W)eb (A)pplication (Scan)ner) is a Open Source web application security scanner. It is designed to find various vulnerabilities …☆26May 7, 2020Updated 5 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- Venom 战队 2019 圣诞拼图挑战赛☆10Mar 27, 2023Updated 2 years ago
- Fuzzing JavaScript WebAssembly APIs using Dharma/Domato (Chrome/v8, etc.)☆43Feb 8, 2022Updated 4 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- A plugin to resolve .plt.sec symbols in IDA☆79Dec 13, 2020Updated 5 years ago
- Witcher is the first framework for using AFL to fuzz web applications.☆104Nov 28, 2023Updated 2 years ago
- 实时 SFTP 同步工具(单向)☆13May 4, 2018Updated 7 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- some pwn or re challenge in ctf games☆40Sep 24, 2019Updated 6 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago