Basic pwntools for Windows
☆267Apr 22, 2023Updated 2 years ago
Alternatives and similar repositories for pwintools
Users that are interested in pwintools are comparing it to the libraries listed below
Sorting:
- Windows Pwnable Study☆407Jun 16, 2025Updated 8 months ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,301Updated this week
- abyss - augmentation of Hexrays decompiler output☆347Oct 26, 2022Updated 3 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆609Jan 13, 2025Updated last year
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- windows debug and exploit toolset for both user and kernel mode☆193Jun 12, 2025Updated 8 months ago
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Rust reversing helper script☆192Dec 16, 2021Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- ☆228Dec 9, 2020Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆442Apr 11, 2025Updated 10 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- Make your IDA Lazy!☆1,395Jan 31, 2026Updated last month
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆860Jun 4, 2020Updated 5 years ago
- Some CTF write up☆255Aug 29, 2025Updated 6 months ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- gdb for pwn☆963Aug 29, 2025Updated 6 months ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- IDA FLIRT Signature Database☆896Jun 27, 2022Updated 3 years ago
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- Packages for IDA Pro (written in python but supports all)☆133Jan 4, 2021Updated 5 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- Write-ups from A*0*E.☆199May 12, 2020Updated 5 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,108Sep 14, 2025Updated 5 months ago
- CTF writeups from Balsn☆472Mar 18, 2022Updated 3 years ago
- Provide powerful tools for seccomp analysis☆1,096Updated this week
- awesome list of browser exploitation tutorials☆2,267Sep 18, 2023Updated 2 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- A Coverage Explorer for Reverse Engineers☆2,505Feb 14, 2026Updated 2 weeks ago
- Perfect Blue's CTF Writeups☆694Jun 24, 2024Updated last year
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago