The autoexpect of pwntools
☆18Feb 10, 2019Updated 7 years ago
Alternatives and similar repositories for pwnup
Users that are interested in pwnup are comparing it to the libraries listed below
Sorting:
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Jan 18, 2018Updated 8 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Dependency lockfiles for reproducible build environments 📦🔒☆48Feb 20, 2026Updated 2 weeks ago
- ☆34Dec 3, 2016Updated 9 years ago
- Applications and utilities for model developers to use in conjunction with the OTM-DE.☆10Apr 1, 2024Updated last year
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Generating short scary stories through language model.☆14Apr 28, 2025Updated 10 months ago
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 7 months ago
- Algerian Wilayas list in different formats (XML, JSON, xsl..etc) for the sake of DRY☆14May 20, 2014Updated 11 years ago
- Vitest for coc.nvim☆12Jul 6, 2023Updated 2 years ago
- [SwiftUI] Pog can track your location regardless of application state (foreground/background/not-running)☆10Jan 20, 2024Updated 2 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- LeetCode OJ's Binary Tree Visualization in Python☆12Nov 19, 2016Updated 9 years ago
- Concise monadic parser combinator library with separate lexer/parser phases, off-side rule and big-size input support.☆11Dec 6, 2024Updated last year
- IDA Pro Folder Management Made Easy☆18Dec 24, 2024Updated last year
- Source code of generator of my (new) blog☆12Nov 10, 2024Updated last year
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- ☆11Mar 8, 2022Updated 4 years ago
- A simple example of using Tile38 to track the ISS and send notifications when it's overhead.☆10Sep 4, 2018Updated 7 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Python Library for the Acquia Cloud API v1. This library is no longer supported as Acquia is dropping support for this API. Please migrat…☆12May 12, 2020Updated 5 years ago
- IDA 9.0 Discord Rich Presence Python plugin☆10Aug 17, 2024Updated last year