vitapluvia / pwnupLinks
The autoexpect of pwntools
☆18Updated 6 years ago
Alternatives and similar repositories for pwnup
Users that are interested in pwnup are comparing it to the libraries listed below
Sorting:
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- hax 'n shit☆119Updated 10 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- ☆21Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆35Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Format string exploitation helper☆45Updated 9 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 months ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆20Updated 5 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆44Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago