Knowledge Base of Exploitation Techniques
☆60Apr 30, 2025Updated 10 months ago
Alternatives and similar repositories for PwnLand
Users that are interested in PwnLand are comparing it to the libraries listed below
Sorting:
- A Pwning Toolkit☆28Jan 11, 2025Updated last year
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- My write-up on TryHackMe, HackTheBox, and CTF.☆71Dec 16, 2020Updated 5 years ago
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 4 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Feb 24, 2026Updated last week
- Some guides about general topics on information security☆13Mar 19, 2019Updated 6 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 5 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- Using various Python libraries such as Pandas, tweetPy, JSON ans matplotLib to take a sneak peek on your Twitter account using Google Col…☆12Aug 25, 2020Updated 5 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- English translation of Cyberhub CTF guidebook + add-ons☆18Jul 10, 2020Updated 5 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 3 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- ☆23Jul 18, 2023Updated 2 years ago
- HITB SECCONF CTF 2022. Developed with ❤️ by Hackerdom team and HITB.☆20Aug 26, 2022Updated 3 years ago
- All checklists☆27Mar 26, 2019Updated 6 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- Hex-Rays CLI (HCLI)☆52Updated this week
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- Challenge source and solutions for InCTF junior (exclusively for Indian school students)☆33Sep 27, 2019Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- Information-Gathering Shell Script☆29Oct 17, 2020Updated 5 years ago
- This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.☆105Feb 3, 2022Updated 4 years ago
- BayesML: your first library for Bayesian machine learning☆16Jan 27, 2026Updated last month
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- The Reverse Engineering Assistant of your dreams☆31Dec 30, 2021Updated 4 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- ☆32Jul 14, 2025Updated 7 months ago
- RE / Binary Exploitation Resources☆73Dec 1, 2017Updated 8 years ago