vitapluvia / pwnup
The autoexpect of pwntools
☆18Updated 6 years ago
Alternatives and similar repositories for pwnup
Users that are interested in pwnup are comparing it to the libraries listed below
Sorting:
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆20Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Slides from my talk at the Gulasch Programming Night 18 about developing Binary Ninja plugins. Recording at: https://www.youtube.com/watc…☆9Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Simple reporting plugin for binary ninja☆16Updated 6 years ago
- ☆11Updated 7 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 7 years ago
- ☆21Updated 6 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- ☆34Updated 9 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Updated 5 years ago
- ☆32Updated 10 months ago
- Format string exploit generation☆10Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Hack In Paris 2018 Slideware☆17Updated 6 years ago