vitapluvia / pwnup
The autoexpect of pwntools
☆18Updated 6 years ago
Alternatives and similar repositories for pwnup:
Users that are interested in pwnup are comparing it to the libraries listed below
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Slides from my talk at the Gulasch Programming Night 18 about developing Binary Ninja plugins. Recording at: https://www.youtube.com/watc…☆9Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Format string exploit generation☆10Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- ☆20Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- ☆21Updated 5 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Updated 6 years ago
- finals-2014☆21Updated 8 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- Regular expression Search on the command-line☆15Updated 10 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago