vitapluvia / pwnup
The autoexpect of pwntools
☆18Updated 5 years ago
Related projects: ⓘ
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆12Updated this week
- Write Up I write for different CTFs☆12Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- ☆20Updated 6 years ago
- ☆44Updated 6 years ago
- Regular expression Search on the command-line☆15Updated 5 months ago
- Format string exploit generation☆9Updated 9 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 8 months ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆20Updated this week
- Plugin for binary ninja to centralize features useful in static analysis.☆15Updated 4 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- ☆25Updated 3 months ago
- Slides from my talk at the Gulasch Programming Night 18 about developing Binary Ninja plugins. Recording at: https://www.youtube.com/watc…☆9Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 4 years ago
- Break Apps with Frida workshop material☆43Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆55Updated 6 years ago
- ☆11Updated 7 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆10Updated this week