SSD Challenges
☆48Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 3 months ago
- CTF solve scripts. Some writeups on my blog, others on my gist. Check the challenge directories for links.☆10Feb 3, 2024Updated 2 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- some sploits☆19Sep 20, 2024Updated last year
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Jun 25, 2015Updated 10 years ago
- Solutions to and walkthroughs for ROPemporium.com challenges☆18Nov 13, 2018Updated 7 years ago
- ☆16Jun 23, 2024Updated last year
- ☆19Jul 21, 2025Updated 7 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 5 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- Leveraging patch diffing to discover new vulnerabilities☆140Oct 21, 2024Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC si…☆30Apr 6, 2025Updated 11 months ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Feb 26, 2026Updated last week
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 6 years ago
- Things i do because i saw it on twitter on a weekend☆57Jul 20, 2025Updated 7 months ago
- ☆34Apr 14, 2025Updated 10 months ago
- Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)☆56Jun 12, 2025Updated 8 months ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 3 weeks ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago