ptr-yudai / pawnyable
PAWNYABLE!
☆208Updated 11 months ago
Alternatives and similar repositories for pawnyable
Users that are interested in pawnyable are comparing it to the libraries listed below
Sorting:
- Python library for CTFer☆142Updated 3 weeks ago
- small cute utils for kernel challenges☆36Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆470Updated this week
- Write-ups for various CTF☆190Updated last year
- kernel-pwn and writeup collection☆613Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆222Updated 4 months ago
- angr tutorial for ctf☆150Updated 4 years ago
- Collection of browser challenges☆132Updated 4 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- ☆177Updated 3 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆77Updated 5 months ago
- a new class of file structure attacks☆50Updated 2 years ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 11 months ago
- Kernel development & exploitation practice environment.☆228Updated last year
- ☆71Updated 11 months ago
- ☆209Updated 2 weeks ago
- ☆109Updated 6 months ago
- ☆41Updated 2 years ago
- Windows Pwnable Study☆351Updated 4 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆18Updated 3 months ago
- A tool for automating setup of kernel pwn challenges☆56Updated 5 months ago
- ropr with some tweaks for better linux kernel support☆18Updated 2 weeks ago
- Linux kernel privilege escalation techniques☆135Updated 9 months ago
- ☆20Updated 3 weeks ago
- ☆162Updated 2 years ago
- repository for kernel exploit practice☆395Updated 5 years ago
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆14Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆203Updated 9 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 2 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆186Updated last year