pwncollege / pwnshopView external linksLinks
the challenge generation framework for pwn.college
☆22Nov 19, 2025Updated 2 months ago
Alternatives and similar repositories for pwnshop
Users that are interested in pwnshop are comparing it to the libraries listed below
Sorting:
- A dojo to teach the basics of low-level computing.☆19Jan 28, 2026Updated 3 weeks ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Yet another xinetd docker used to build pwnable challenges.☆37Jun 28, 2019Updated 6 years ago
- Script to setup pwn environment with Docker☆47Jan 10, 2026Updated last month
- ReCopilot IDA☆49Jan 12, 2026Updated last month
- Dark+ Theme☆50May 17, 2024Updated last year
- ☆46Jan 23, 2022Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 2 years ago
- attachments and (some) writeups/source code for RWCTF 5th☆59Jan 10, 2023Updated 3 years ago
- ☆25Sep 27, 2023Updated 2 years ago
- ida pro collapse plugin☆30Jul 26, 2023Updated 2 years ago
- a GDB plug-in for inspecting mallocng☆60Aug 10, 2024Updated last year
- a new class of file structure attacks☆58Nov 19, 2022Updated 3 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆33Jul 13, 2022Updated 3 years ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- FF XIV Midiplayer standalone app, for solo and ensemble (Bards of Light)☆11Dec 1, 2025Updated 2 months ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Jun 15, 2023Updated 2 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- My Personal Reading lists for CVE Writeups☆38Feb 10, 2022Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- A Heathkit ET-3400 Emulator written in C#☆13Sep 1, 2021Updated 4 years ago
- 简易定制化DDOS打击工具,可用于自动打击部署☆11May 10, 2023Updated 2 years ago
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated last week
- Find alpha, manage positions in Polymarket☆34Feb 11, 2026Updated last week
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆12Mar 16, 2022Updated 3 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Updated version of Astro by aiczk☆11May 30, 2023Updated 2 years ago
- A reversing plugin for cross-decompiler collaboration, built on git.☆680Updated this week
- Archive of AAA CTF 2023 (XCTF competition)☆37Nov 27, 2023Updated 2 years ago
- ☆40Feb 3, 2026Updated 2 weeks ago
- Infrastructure powering the pwn.college dojo☆430Feb 7, 2026Updated last week
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- X32DBG QT5 parsing scripts☆11Sep 8, 2022Updated 3 years ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago