masthoon / pwintoolsLinks
Basic pwntools for Windows
β263Updated 2 years ago
Alternatives and similar repositories for pwintools
Users that are interested in pwintools are comparing it to the libraries listed below
Sorting:
- Collection of scripts and writeupsβ323Updated 3 years ago
- πHeap analysis tool for CTF pwn.β223Updated 4 years ago
- Web wrapper of niklasb/libc-databaseβ204Updated 6 months ago
- Some CTF write upβ246Updated 3 years ago
- β223Updated 4 years ago
- Linux Heap Exploitation Practiceβ383Updated 6 years ago
- Script to setup pwn environment for CTF with Dockerβ154Updated 3 years ago
- β175Updated 6 years ago
- repository for kernel exploit practiceβ396Updated 5 years ago
- β109Updated 5 years ago
- Using Intel's PIN tool to solve CTF problemsβ499Updated 5 years ago
- Windows Pwnable Studyβ353Updated 4 years ago
- A Binary Ninja plugin for vulnerability research.β294Updated 8 months ago
- My Chrome and Safari exploit code + write-up repoβ527Updated 3 years ago
- windows debug and exploit toolset for both user and kernel modeβ188Updated this week
- Some new commands debug heap for pedaβ99Updated last month
- Exploiting challenges in Linux and Windowsβ122Updated 5 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwningβ194Updated 2 years ago
- Code and exercises for a workshop on z3 and angrβ228Updated 4 years ago
- πCTF pwn framework.β344Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.β199Updated 4 years ago
- angr tutorial for ctfβ150Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, anβ¦β188Updated last year
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets togetherβ386Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119β139Updated 4 years ago
- A tool for finding the one gadget RCE in libcβ76Updated 5 years ago
- Corpus of public v8 vulnerability PoCs.β212Updated 3 years ago
- β198Updated 2 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.β223Updated 4 years ago
- How to build an efficient pwn development environment in 2020β264Updated 4 years ago