zardus / pwnsh
tools for shellcoding
☆53Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pwnsh
- A collection of curated resources and CVEs I use for research.☆102Updated 3 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆73Updated 4 years ago
- A library for patching ELFs☆53Updated 3 years ago
- A collection of browser exploitation codes from Singular Security Lab.☆181Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆188Updated 2 years ago
- ☆45Updated last year
- A tool for finding the one gadget RCE in libc☆74Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆181Updated 7 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆138Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆49Updated 4 months ago
- a repo of links to useful writeups of pwn challenges☆25Updated 6 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆67Updated last month
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆79Updated 5 years ago
- ☆24Updated 3 years ago
- REVerse ENGineering Environment☆57Updated 6 months ago
- ☆26Updated 2 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆47Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆38Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- Extendable Visualization & Exploitation tool for glibc heap☆56Updated 2 months ago
- Automatic ROPChain Generation☆280Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆42Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆109Updated 7 years ago
- Old and new CTFs about Linux kernel exploitation.☆50Updated 2 years ago
- ☆152Updated 5 years ago
- ☆49Updated 3 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year