A docker environment for pwn in ctf
☆21Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for Pwndocker
Users that are interested in Pwndocker are comparing it to the libraries listed below
Sorting:
- Fuck capstone.CsError: Different API version between core & binding (CS_ERR_VERSION)☆13Nov 16, 2017Updated 8 years ago
- write up for pwnable.kr☆24Nov 1, 2017Updated 8 years ago
- ☆27Dec 10, 2021Updated 4 years ago
- fuzz the linux kernel bpf verifier☆83Oct 9, 2021Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- A docker environment for pwn in ctf☆803Sep 15, 2025Updated 5 months ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- ☆157Jun 15, 2022Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆91Apr 8, 2019Updated 6 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- ☆11May 14, 2021Updated 4 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- An experimental LLVM pass plugin that allows you to apply the State of the Art function merging techniques☆16Feb 8, 2025Updated last year
- Collection of AWS Lambda functions in Python☆11Mar 13, 2019Updated 6 years ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 7 months ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Multi-version glibc source browser based on code.woboq.org 's product.☆10Feb 27, 2020Updated 6 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 10 months ago
- ☆10Jun 9, 2021Updated 4 years ago
- 生异形吗?挖掘构建你自己的Java内存马!☆14May 22, 2025Updated 9 months ago
- CTF challenge writeups☆13Dec 10, 2020Updated 5 years ago
- ☆10Jul 21, 2022Updated 3 years ago
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- https://nnsmith-asplos.rtfd.io Artifact of "NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers" ASPLOS'23☆11Mar 29, 2023Updated 2 years ago
- Official source code and writeups of *CTF2021☆82Feb 27, 2021Updated 5 years ago
- Tesla Hack All Vehicles DoS Infotainment Touchscreen Interface CVE-2020-10558☆14Feb 23, 2026Updated last week
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 4 years ago
- ☆15Jan 30, 2025Updated last year
- ☆11Sep 12, 2022Updated 3 years ago
- Definitely not for fuzzing☆11Oct 22, 2020Updated 5 years ago
- ctf patching toy☆49Nov 18, 2024Updated last year
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- A module that multiplexes interactions with lists of python objects.☆14Aug 24, 2022Updated 3 years ago