MCP for Pwn
☆240Mar 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for pwno-mcp
Users that are interested in pwno-mcp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some V8 n-day exploits that I've written☆53Mar 1, 2026Updated 3 weeks ago
- An exploit farm for attack/defense CTFs.☆28Feb 14, 2026Updated last month
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆405Jan 25, 2025Updated last year
- Windows Win32 Kernel Subsystem☆37Aug 23, 2025Updated 7 months ago
- An intuitive query API for IDA Pro☆167Oct 20, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated last month
- Quickly find differences and similarities in disassembled code☆41Nov 21, 2024Updated last year
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 3 months ago
- Templates for deploying pwn challenge in ctf☆53Mar 24, 2023Updated 3 years ago
- ☆21Apr 6, 2025Updated 11 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- ☆56Jan 17, 2026Updated 2 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated 2 weeks ago
- ☆16Feb 27, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆19Oct 11, 2022Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- Toolkit to weaponize Chromium vulnerabilities into reliable, cross-platform, full-chain exploits☆282Mar 16, 2026Updated 2 weeks ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- WASMaker, a novel differential testing framework that can generate complicated Wasm test cases by disassembling and assembling real-world…☆17Jul 27, 2024Updated last year
- A plugin to introduce interactive symbols into your debugger from your decompiler☆786Feb 18, 2026Updated last month
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆101Jun 20, 2025Updated 9 months ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago
- Binary Exploitation Phrack CTF Challenge☆142Aug 21, 2025Updated 7 months ago
- ☆31Aug 13, 2025Updated 7 months ago
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- kernel-pwn and writeup collection☆707Oct 2, 2023Updated 2 years ago
- Docker configuration (and only docker configuration) files for hosting self-hosted Hexvault, Lumina and Hexlicsrv.☆46Sep 12, 2025Updated 6 months ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆40May 13, 2025Updated 10 months ago
- Write dynamic binary analysis tools in Python☆130Jul 25, 2025Updated 8 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆175Nov 11, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆494Oct 11, 2025Updated 5 months ago
- A Model Context Protocol server for IDA☆534May 29, 2025Updated 10 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Symbolic executor for Binary Ninja's MLIL☆25Oct 3, 2024Updated last year
- IDA helper plugin to reverse engineer Objective-C code☆44Jun 12, 2025Updated 9 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year