PEDA - Python Exploit Development Assistance for GDB
☆13Jul 13, 2024Updated last year
Alternatives and similar repositories for peda
Users that are interested in peda are comparing it to the libraries listed below
Sorting:
- WonderCMS Authenticated RCE - CVE-2023-41425☆25Dec 30, 2024Updated last year
- OneBot、钉钉、Telegram开发框架☆10Feb 23, 2025Updated last year
- CSDK for EC618 (Air780E)☆11Nov 13, 2022Updated 3 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 10 months ago
- Tkinter Application for transform image into braille art.☆11Apr 20, 2021Updated 4 years ago
- ☆10Nov 18, 2023Updated 2 years ago
- kubernetes resources recommend☆23Aug 18, 2025Updated 6 months ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆22Mar 25, 2025Updated 11 months ago
- Templates for deploying pwn challenge in ctf☆51Mar 24, 2023Updated 2 years ago
- Linux C program collection☆10Nov 25, 2024Updated last year
- ☆13Sep 15, 2024Updated last year
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- AssetStudio中文版 是一个用于查找、提取和导出资产和资产包的工具。☆14Dec 4, 2024Updated last year
- graphical console client for virtual machines using spice/vnc☆12Jan 23, 2014Updated 12 years ago
- Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and ac…☆20Feb 9, 2026Updated 3 weeks ago
- Tkinter Application for send embeds with a bot.☆11Apr 20, 2021Updated 4 years ago
- Config files for my GitHub profile.☆10Apr 20, 2025Updated 10 months ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Emmet plugin for PSPad☆19Mar 11, 2013Updated 12 years ago
- LibML is a library for loading, configuring, and running machine learning models in production. It provides a simple high-level API for C…☆13Mar 14, 2025Updated 11 months ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- petiger的版本发布☆11Dec 3, 2020Updated 5 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- ☆11Jun 30, 2023Updated 2 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- BakaXL的Minecraft启动核心,采用Rust编写☆10Jun 21, 2023Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A guide to install ubuntu on segfault server // "Check this repo if you don't know it" https://github.com/mrx7014/SSH-KaliLinux☆13Dec 17, 2023Updated 2 years ago
- ☆12Feb 3, 2026Updated 3 weeks ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- RSS migrator for Hexo.☆11Jul 29, 2023Updated 2 years ago