rootfoo / libctf
CTF exploit development and other tools of pwnage
☆21Updated 5 years ago
Related projects: ⓘ
- ☆14Updated this week
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆11Updated this week
- ☆34Updated this week
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- ☆29Updated this week
- Format string exploit generation☆9Updated 9 years ago
- CVE-2015-3073 PoC☆11Updated 8 years ago
- ☆14Updated this week
- ☆26Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 6 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 7 years ago
- ☆26Updated this week
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- ☆20Updated 6 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 7 years ago
- ☆41Updated 6 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- ☆10Updated 2 years ago
- Win32 Shellcodes☆9Updated 6 years ago
- ☆7Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- CVE-2016-3141☆15Updated 8 years ago
- ☆26Updated this week
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago