Automated solver of classic CTF pwn challenges, with flexibility in mind.
☆65Apr 3, 2022Updated 3 years ago
Alternatives and similar repositories for autorop
Users that are interested in autorop are comparing it to the libraries listed below
Sorting:
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- A script to factorize integers with sagemath and factordb.☆12Feb 11, 2025Updated last year
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- Space Heroes CTF was an online jeopardy style Capture the Flag competition that our FITSEC Team From Florida Tech host April 1st-April 3r…☆14Apr 5, 2022Updated 3 years ago
- Do pwn by command line☆420Apr 27, 2025Updated 10 months ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- pwndbg、pwn-peda、pwn-gef和Pwngdb四合一,一合四,通过命令gdb-peda、gdb-pwndbg、gdb-peda轻松切换gdb插件☆39Oct 23, 2023Updated 2 years ago
- 一款碾压sqlmap的sql注入漏洞检测系统^^☆16Jan 1, 2021Updated 5 years ago
- ☆317Jun 27, 2024Updated last year
- Reverse Engineering challenges☆36Dec 23, 2020Updated 5 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆52Mar 24, 2023Updated 2 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆50Mar 26, 2019Updated 6 years ago
- Collection of my volatility3 plugins☆18Sep 6, 2024Updated last year
- 适用AWD-WEB的各种场景下的攻击框架。☆22May 26, 2023Updated 2 years ago
- ☆177Jul 22, 2022Updated 3 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago
- Docker file templates for GZCTF, including crypto, pwn, web.☆21Aug 10, 2023Updated 2 years ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆24Oct 1, 2023Updated 2 years ago
- 360 QuakeAPI批量查询工具☆16Jul 20, 2021Updated 4 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- 基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ☆54Dec 26, 2024Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Sep 15, 2022Updated 3 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- awd/awdp 小工具,使用 javassist 对 jar 包进行 patch☆30Nov 9, 2023Updated 2 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- 请叫我跳跳虎☆32Dec 21, 2020Updated 5 years ago
- ☆997Jan 23, 2023Updated 3 years ago
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆115Apr 20, 2021Updated 4 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆138Dec 31, 2023Updated 2 years ago
- A CTF challenge generator.☆11Nov 29, 2023Updated 2 years ago
- Simple WebSocket fuzzer☆32Jun 15, 2023Updated 2 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆68Jan 13, 2026Updated last month
- Automate repetitive tasks for fuzzing☆124Jul 26, 2021Updated 4 years ago
- ☆1,106Mar 14, 2024Updated last year