takeshixx / ctfpwnng
Automation framework for attack-defense CTFs.
☆15Updated 5 years ago
Alternatives and similar repositories for ctfpwnng:
Users that are interested in ctfpwnng are comparing it to the libraries listed below
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆20Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- public exploits☆35Updated last year
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- ☆34Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆71Updated 4 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆13Updated 5 years ago
- ☆44Updated 6 years ago
- ☆25Updated 3 years ago
- ☆38Updated 4 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago