Collection of pwn techniques
☆29Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below
Sorting:
- ☆10Jan 8, 2023Updated 3 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- ☆15Jul 5, 2020Updated 5 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- Stack Based buffer overflow attack☆19Nov 25, 2023Updated 2 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- angr tutorial for ctf☆165Apr 11, 2021Updated 4 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- CTFs and solutions for Linux binary exploitation.☆113Jun 9, 2024Updated last year
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- Binary Golf Library☆61May 1, 2021Updated 4 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 2 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆74Apr 16, 2021Updated 4 years ago
- ☆27May 25, 2022Updated 3 years ago
- My notes on pwn☆296Jan 12, 2026Updated last month
- CTF challenges I've written☆36Apr 20, 2023Updated 2 years ago
- ☆78Apr 20, 2020Updated 5 years ago
- multi platform game engine☆11Sep 1, 2025Updated 6 months ago
- PAWNYABLE!☆235May 30, 2024Updated last year
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- CTF write-up☆35Jan 11, 2024Updated 2 years ago
- small cute utils for kernel challenges☆40Apr 23, 2024Updated last year
- Complexity analysis in Lean☆10Feb 5, 2024Updated 2 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- Parallel Programming Fall 2022 @ NYCU☆11Jan 12, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- Compiler generator (3rd Futamura projection) for first-order Scheme☆13May 21, 2016Updated 9 years ago
- A chip8 emulator made in gameboy assembly for the gameboy☆16Aug 12, 2021Updated 4 years ago
- Tiniest ELF (Executable and Linkable Format) executable☆14Aug 27, 2018Updated 7 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago