pr0cf5 / pwn-training
labs for binary exploitation
☆13Updated 5 years ago
Alternatives and similar repositories for pwn-training:
Users that are interested in pwn-training are comparing it to the libraries listed below
- ☆24Updated 11 months ago
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 6 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 8 months ago
- Our team's CTF writeups☆10Updated 5 years ago
- CTF binary exploit code☆38Updated 6 years ago
- My fuzzing workshop from PHDays9☆26Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- qiling framework examples☆16Updated 3 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- ☆15Updated 8 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆15Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 4 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 7 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆23Updated 4 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago