punixcorn / peda
PEDA - Python Exploit Development Assistance for GDB
☆11Updated 7 months ago
Alternatives and similar repositories for peda:
Users that are interested in peda are comparing it to the libraries listed below
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆55Updated 2 years ago
- CVE-2023-4911☆14Updated last year
- CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.☆28Updated 6 months ago
- Udemy – Linux Heap Exploitation☆39Updated 3 years ago
- Exploit for CVE-2023-41892☆12Updated last year
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆17Updated 5 months ago
- PHP CGI Argument Injection vulnerability☆30Updated 8 months ago
- A collection of pyjails!☆16Updated 2 months ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆22Updated 2 years ago
- CVE-2024-4577 RCE PoC☆19Updated 2 months ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Updated 5 years ago
- WonderCMS Authenticated RCE - CVE-2023-41425☆25Updated last month
- Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example☆17Updated 3 months ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆58Updated 2 months ago
- Challenges for ImaginaryCTF 2024☆31Updated 6 months ago
- Github repository which contains a functional exploit for CVE-2021-39165☆21Updated 2 years ago
- USENIX 2023 Artifacts☆11Updated 2 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Updated 4 months ago
- Volatility Explorer Suit☆62Updated 2 years ago
- HITCON 2023 x DEVCORE Wargame☆20Updated last year
- ☆42Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆48Updated 2 years ago
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆5Updated last year
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 8 months ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆66Updated 5 months ago
- CVE's we discovered along the way☆16Updated 3 years ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year