nushosilayer8 / pwnView external linksLinks
Collection of pwn techniques
☆29Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below
Sorting:
- A repository of all challenges featured in the RaRCTF 2021 Capture The Flag.☆33Sep 21, 2021Updated 4 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- ☆15Jul 5, 2020Updated 5 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆36Nov 21, 2020Updated 5 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- Stack Based buffer overflow attack☆19Nov 25, 2023Updated 2 years ago
- angr tutorial for ctf☆163Apr 11, 2021Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆113Jun 9, 2024Updated last year
- a new class of file structure attacks☆58Nov 19, 2022Updated 3 years ago
- linux kernel cross page attack demo module☆31Mar 15, 2023Updated 2 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆74Apr 16, 2021Updated 4 years ago
- ☆27May 25, 2022Updated 3 years ago
- My notes on pwn☆294Jan 12, 2026Updated last month
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆38Feb 8, 2025Updated last year
- multi platform game engine☆11Sep 1, 2025Updated 5 months ago
- PAWNYABLE!☆234May 30, 2024Updated last year
- CTF write-up☆35Jan 11, 2024Updated 2 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated 3 weeks ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated this week
- small cute utils for kernel challenges☆40Apr 23, 2024Updated last year
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- Parallel Programming Fall 2022 @ NYCU☆11Jan 12, 2023Updated 3 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- Complexity analysis in Lean☆10Feb 5, 2024Updated 2 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated last year
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆18Jun 24, 2025Updated 7 months ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Programming language for beginners - Lenguaje de programación para principiantes☆11Nov 10, 2020Updated 5 years ago
- 作業系統實作☆13Apr 26, 2018Updated 7 years ago
- Basic utility to launch an ARM binary from the SD card of a Wii.☆15Feb 19, 2024Updated last year
- ☆30Nov 25, 2025Updated 2 months ago