pwno-io / pwno-mcpLinks
MCP for Pwn
☆202Updated last month
Alternatives and similar repositories for pwno-mcp
Users that are interested in pwno-mcp are comparing it to the libraries listed below
Sorting:
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆263Updated 4 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- ☆270Updated 6 months ago
- ☆36Updated last year
- A tool for automating setup of kernel pwn challenges☆61Updated 3 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆216Updated last month
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆88Updated 2 months ago
- A headless, extendable, multi-session, IDA Pro MCP framework.☆137Updated 3 weeks ago
- ☆113Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆89Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Updated 6 months ago
- ASLR bypass without infoleak☆167Updated 4 years ago
- ☆101Updated last month
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆241Updated last year
- Source code for the DEF CON 31 CTF Qualifiers.☆127Updated 2 years ago
- Collection of browser challenges☆139Updated 4 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 5 months ago
- Source for challenges from bi0sCTF☆49Updated 7 months ago
- ☆22Updated last week
- ☆130Updated last year
- An intuitive query API for IDA Pro☆165Updated 3 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆60Updated 2 years ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆174Updated last year
- ☆217Updated 5 months ago
- Easily debug processes running in docker containers☆29Updated last year
- ☆131Updated 5 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- Research browsers☆46Updated 3 weeks ago
- Repo for talk slides & materials☆21Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆138Updated last year