vitapluvia / pwnupView external linksLinks
The autoexpect of pwntools
☆18Feb 10, 2019Updated 7 years ago
Alternatives and similar repositories for pwnup
Users that are interested in pwnup are comparing it to the libraries listed below
Sorting:
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Jan 18, 2018Updated 8 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 10 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Dependency lockfiles for reproducible build environments 📦🔒☆48Feb 5, 2026Updated last week
- ☆34Dec 3, 2016Updated 9 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- Applications and utilities for model developers to use in conjunction with the OTM-DE.☆10Apr 1, 2024Updated last year
- Generating short scary stories through language model.☆13Apr 28, 2025Updated 9 months ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Scalable task execution orchestrator for CodeOcean.☆10Feb 1, 2026Updated 2 weeks ago
- ☆11Mar 8, 2022Updated 3 years ago
- ☆12Jan 5, 2016Updated 10 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Web scraper, Twitter bot, Flask API, Cloudflare avoider :D☆10Jul 15, 2024Updated last year
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- [SwiftUI] Pog can track your location regardless of application state (foreground/background/not-running)☆10Jan 20, 2024Updated 2 years ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 6 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- PEiD like python script☆10Mar 5, 2017Updated 8 years ago
- Concise monadic parser combinator library with separate lexer/parser phases, off-side rule and big-size input support.☆11Dec 6, 2024Updated last year