nobodyisnobody / docs
various docs (that are interesting, or not, depending on the point of view...)
☆111Updated last year
Alternatives and similar repositories for docs:
Users that are interested in docs are comparing it to the libraries listed below
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- Collection of browser challenges☆130Updated 3 years ago
- ☆46Updated last year
- a new class of file structure attacks☆50Updated 2 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆221Updated 3 months ago
- ☆195Updated last week
- Write-ups for various CTF☆188Updated last year
- ☆89Updated 11 months ago
- A GDB+GEF-style debugger for unloading Python pickles☆63Updated 3 months ago
- Python library for CTFer☆137Updated 2 weeks ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆18Updated 2 months ago
- small cute utils for kernel challenges☆35Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆76Updated 4 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆449Updated this week
- Easily debug processes running in docker containers☆22Updated 10 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- PAWNYABLE!☆206Updated 10 months ago
- ☆174Updated 2 months ago
- An intuitive query API for IDA Pro☆155Updated last month
- ropr with some tweaks for better linux kernel support☆18Updated last month
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆19Updated 2 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆170Updated this week
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year
- ☆162Updated 2 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆38Updated last year
- ☆125Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆42Updated 2 years ago
- Collection of pwn techniques☆28Updated 3 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Updated 4 years ago