Debug pwn in docker, no need for virtual machines
☆38Oct 10, 2025Updated 4 months ago
Alternatives and similar repositories for pwn-docker-environment
Users that are interested in pwn-docker-environment are comparing it to the libraries listed below
Sorting:
- ☆11Sep 12, 2021Updated 4 years ago
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 6 months ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- My CTF Writeup☆28Nov 20, 2024Updated last year
- ☆64Nov 26, 2021Updated 4 years ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆267May 27, 2024Updated last year
- A tool for easy manage a pwn server☆17Oct 29, 2018Updated 7 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- ☆11Sep 5, 2019Updated 6 years ago
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- Replace gdb default history searcher and auto complete with fzf fuzzy finder☆25Apr 14, 2023Updated 2 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- derper's mom☆13Oct 28, 2025Updated 4 months ago
- ☆239Jan 14, 2024Updated 2 years ago
- C library for developing file systems in userspace that leverage LD_PRELOAD.☆29Jan 29, 2024Updated 2 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- Quick pwn environment setup from Ubuntu16.04 to Ubuntu 24.04. STOP WASTING YOUR TIME ON ENV SETUP.☆11May 16, 2025Updated 9 months ago
- A tool to choose the best CDN anycast IP☆13Jan 5, 2024Updated 2 years ago
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆31Oct 14, 2024Updated last year
- Exploit for CVE-2022-27666☆205Mar 28, 2022Updated 3 years ago
- A /proc/mem IDA loader to snapshot a running process☆169Jun 29, 2025Updated 8 months ago
- Container (Docker) escape exploits☆53Dec 15, 2021Updated 4 years ago
- Source code for the DEF CON 30 CTF Finals.☆55Oct 12, 2022Updated 3 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- ida pro theme☆14Aug 20, 2018Updated 7 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 3 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 3 months ago
- a GDB plug-in for inspecting mallocng☆60Aug 10, 2024Updated last year
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- ☆12May 24, 2022Updated 3 years ago
- ALIEN: idA Local varIables/inLine functIons rEcogNizer☆18Dec 21, 2021Updated 4 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆18Oct 13, 2020Updated 5 years ago