pwno-io / pwno-mcpLinks
MCP for Pwn
☆145Updated last week
Alternatives and similar repositories for pwno-mcp
Users that are interested in pwno-mcp are comparing it to the libraries listed below
Sorting:
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 9 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆254Updated last month
- ☆129Updated last year
- ASLR bypass without infoleak☆163Updated 4 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- ☆60Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- Static binary instrumentation for windows kernel drivers, to use with winafl☆77Updated 9 months ago
- ☆81Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated 2 weeks ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆194Updated 5 months ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆84Updated last year
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 2 months ago
- A tool for automating setup of kernel pwn challenges☆60Updated 2 weeks ago
- ☆107Updated 10 months ago
- ☆251Updated 3 months ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated 11 months ago
- ☆70Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆68Updated last year
- ☆120Updated 2 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆125Updated 2 years ago
- ☆84Updated 2 months ago
- An intuitive query API for IDA Pro☆162Updated 3 weeks ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- Research browsers☆43Updated last week
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆81Updated 4 months ago
- ☆36Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- Repo for talk slides & materials☆21Updated 11 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆122Updated last year