labs for binary exploitation
☆13Jul 16, 2019Updated 6 years ago
Alternatives and similar repositories for pwn-training
Users that are interested in pwn-training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 17, 2017Updated 8 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Scraper for kleinanzeigen.de☆16Apr 7, 2026Updated last week
- Contains random code and some of my older projects☆28Feb 28, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆17Aug 20, 2014Updated 11 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- KPI Reporter is a dev-friendly, on-premises tool for crafting automated reports on what matters to you.☆10Oct 6, 2022Updated 3 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- A WebSocket proxy server using Python 3.☆21Mar 15, 2026Updated last month
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Sep 1, 2018Updated 7 years ago
- temporary root for the Galaxy S7 Active☆21Nov 28, 2016Updated 9 years ago
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc☆10Mar 25, 2021Updated 5 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- An Ebay-kleinanzeigen Web scraper using Python and Scrapy to fetch data into an ElasticSearch cluster with Kibana☆20May 14, 2024Updated last year
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- repository for kernel exploit practice☆417Nov 12, 2019Updated 6 years ago
- Bulk port checker written with Go☆19Apr 10, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nessus Audit files☆33Feb 7, 2023Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- AuthBypass & Auto Backdooring Devices☆16Apr 12, 2019Updated 7 years ago
- 针对《解密家用路由器0day漏洞挖掘技术》一书的相关笔记☆16Oct 12, 2020Updated 5 years ago
- V2G evaluation tool☆23May 7, 2025Updated 11 months ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆52Nov 22, 2021Updated 4 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 9 years ago
- ☆23Nov 18, 2021Updated 4 years ago
- Source for BuckeyeCTF 2022 challenges☆27Nov 7, 2022Updated 3 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- ☆36Feb 17, 2020Updated 6 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- A simple polymorphic engine☆21Jun 5, 2020Updated 5 years ago