pawlos / GynColorsForSublimeLinks
Colors for Sublime Text that maches Gynvael Coldwind vim colours
☆17Updated 4 years ago
Alternatives and similar repositories for GynColorsForSublime
Users that are interested in GynColorsForSublime are comparing it to the libraries listed below
Sorting:
- ☆49Updated 4 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 3 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last week
- a repo of links to useful writeups of pwn challenges☆27Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- ☆91Updated 6 years ago
- ☆26Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆34Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- Stuff that should be imprinted in the mind☆34Updated 15 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- ☆92Updated 4 years ago
- python and honggfuzz☆25Updated 5 years ago
- ☆110Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- Exploitation and Mitigation Slides☆131Updated last year
- ☆92Updated 7 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago