Collection of pwn techniques
☆29Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jan 8, 2023Updated 3 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt☆15Oct 5, 2023Updated 2 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- WinDbg cheat sheet☆17May 10, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A repository of all challenges featured in the RaRCTF 2021 Capture The Flag.☆33Sep 21, 2021Updated 4 years ago
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Jan 8, 2022Updated 4 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- CTF challenges I've written☆36Apr 20, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Binary Golf Library☆61May 1, 2021Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆113Jun 9, 2024Updated last year
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- Cryptanalysis tool for the Enigma machine☆17Aug 21, 2023Updated 2 years ago
- OTP generation & validation library for Rust☆15Dec 4, 2025Updated 3 months ago
- EyeTrackVR Documentation Website☆15Dec 31, 2025Updated 2 months ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- CTF pwn problem writeup☆42Apr 23, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- a new class of file structure attacks☆60Nov 19, 2022Updated 3 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- Demo code for the talk Dependent Types in Haskell in Hong Kong Functional Programming meetup☆16Dec 13, 2018Updated 7 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- Collection of Spectre-type, Meltdown-type and MDS-type PoCs☆10Aug 25, 2020Updated 5 years ago
- ☆14Aug 28, 2023Updated 2 years ago
- Web service for facial landmark detection, head pose estimation, facial action unit recognition, and eye-gaze estimation based on OpenFac…☆20Oct 13, 2021Updated 4 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆15Jul 5, 2020Updated 5 years ago
- CTF write-up☆35Jan 11, 2024Updated 2 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Pure Rust no_std MP3 decoder. Based on minimp3☆17Aug 19, 2025Updated 7 months ago
- My notes on pwn☆297Jan 12, 2026Updated 2 months ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year