rodobre / interfuzzLinks
A simple network fuzzer intended to test the low level handling of malformed packets
β8Updated 5 years ago
Alternatives and similar repositories for interfuzz
Users that are interested in interfuzz are comparing it to the libraries listed below
Sorting:
- The greatest tool to ever grace the computers of this earth π―β30Updated 6 years ago
- CTFd Dump - When you want to have an offline copy of a CTF.β48Updated 11 months ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.β134Updated 9 months ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.β23Updated 4 years ago
- β26Updated 3 years ago
- Dockerfiles for pwnβ8Updated 3 years ago
- An interactive memory info for pwning / exploitingβ102Updated 2 years ago
- GlibC Malloc for Exploiters presentationβ147Updated 5 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, anβ¦β188Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.β28Updated 3 years ago
- Cross-architecture instruction counting for CTF solvingβ47Updated 3 years ago
- πHeap analysis tool for CTF pwn.β223Updated 4 years ago
- β29Updated 2 years ago
- various CTF writeupsβ60Updated 6 years ago
- β160Updated 5 years ago
- Manage building and deploying exploitation challenges with easeβ58Updated last month
- A tool for automating setup of kernel pwn challengesβ55Updated 6 months ago
- REVerse ENGineering Environmentβ60Updated last year
- A quick-and-easy web CTF platform for people who love ASCII and minimalism.β13Updated 3 years ago
- A tool for finding the one gadget RCE in libcβ76Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurationsβ71Updated 8 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.β73Updated 6 years ago
- A pwning environment, now on docker!β18Updated 3 years ago
- β46Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwningβ194Updated 2 years ago
- Upcoming list of ctfs directly in your terminal!β16Updated 2 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.β223Updated 4 years ago
- Old and new CTFs about Linux kernel exploitation.β55Updated 3 years ago
- β20Updated 3 years ago
- Unravels any libcs magic for your ret2libc exploit.β81Updated 2 years ago