veritas501 / ae64View external linksLinks
basic amd64 alphanumeric shellcode encoder
☆200Jan 15, 2024Updated 2 years ago
Alternatives and similar repositories for ae64
Users that are interested in ae64 are comparing it to the libraries listed below
Sorting:
- Alphanumeric shellcode encoder.☆172Apr 1, 2016Updated 9 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆777Oct 22, 2025Updated 3 months ago
- A tool to change the libc environment of running files(一个在CTF比赛中用于切换题目运行libc环境的工具)☆68Nov 26, 2025Updated 2 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- ☆16Jun 9, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/alpha3☆56Mar 31, 2020Updated 5 years ago
- ☆19Nov 12, 2024Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Do pwn by command line☆416Apr 27, 2025Updated 9 months ago
- a new class of file structure attacks☆58Nov 19, 2022Updated 3 years ago
- ☆314Jun 27, 2024Updated last year
- ☆40Feb 3, 2026Updated last week
- Templates for deploying pwn challenge in ctf☆51Mar 24, 2023Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- A docker environment for pwn in ctf☆797Sep 15, 2025Updated 4 months ago
- ☆26May 10, 2021Updated 4 years ago
- linux kernel cross page attack demo module☆31Mar 15, 2023Updated 2 years ago
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- Archive of AAA CTF 2022 (XCTF competition)☆78Nov 6, 2024Updated last year
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- IDA FLIRT Signature Database☆896Jun 27, 2022Updated 3 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- Script to setup pwn environment with Docker☆47Jan 10, 2026Updated last month
- A CTF fuzz powerd by protobuf.☆15May 24, 2022Updated 3 years ago
- ctfs-2019☆12Nov 29, 2019Updated 6 years ago
- ☆43Nov 28, 2021Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- 零基础入门V8引擎漏洞挖掘☆281Apr 8, 2024Updated last year
- a GDB plug-in for inspecting mallocng☆60Aug 10, 2024Updated last year
- Provide powerful tools for seccomp analysis☆1,095Feb 3, 2026Updated last week
- glibc offset search for ctf.☆785Feb 18, 2023Updated 2 years ago
- gdb for pwn☆960Aug 29, 2025Updated 5 months ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆175Jan 1, 2025Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- For V8CTF M123☆17Aug 25, 2024Updated last year
- ☆105Nov 11, 2023Updated 2 years ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆188Dec 25, 2020Updated 5 years ago
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago