pwntools on Ruby!
☆152May 4, 2025Updated 10 months ago
Alternatives and similar repositories for pwntools-ruby
Users that are interested in pwntools-ruby are comparing it to the libraries listed below
Sorting:
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- ELF parser library implemented in pure Ruby!☆46Nov 1, 2025Updated 4 months ago
- crabstone is a Ruby binding to the capstone disassembly library by Nguyen Anh Quynh☆40Sep 14, 2015Updated 10 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 3 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- crabstone is a Ruby binding to the capstone disassembly library by Nguyen Anh Quynh☆19Aug 4, 2024Updated last year
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Some writeups in ctf.☆11Mar 31, 2022Updated 3 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆64Oct 31, 2020Updated 5 years ago
- It's time for Ruby lovers to use Ruby in gdb, and gdb in Ruby!☆65Feb 26, 2026Updated 3 weeks ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- My Workspace dotfiles config .☆13Jun 30, 2021Updated 4 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,304Mar 5, 2026Updated 2 weeks ago
- Tools about security.txt for Ruby☆20Oct 14, 2023Updated 2 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- codebook by eddy1021, c2251393, tzupengwang☆52May 20, 2018Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- ACM-ICPC 2017 Jakarta Regional Repository☆27Aug 31, 2020Updated 5 years ago
- gdb for pwn☆967Aug 29, 2025Updated 6 months ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago