GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+24588.24%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+617.65%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+24476.47%)
HyperpwnA hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (+2176.47%)
ctf-writeupsWriteups of CTF challenges
Stars: ✭ 19 (+11.76%)
FastPwnCTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (+5.88%)
winpwnCTF windows pwntools
Stars: ✭ 137 (+705.88%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (+288.24%)
mini-kaliDocker image for hacking
Stars: ✭ 15 (-11.76%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+50400%)
Heapinspect🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (+941.18%)
heaptracehelps visualize heap operations for pwn and debugging
Stars: ✭ 252 (+1382.35%)
ctfctf wp 2019-2020
Stars: ✭ 23 (+35.29%)
Ctf WikiCome and join us, we need you!
Stars: ✭ 5,305 (+31105.88%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (+164.71%)
Ctf Pwn TipsHere record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.
Stars: ✭ 1,249 (+7247.06%)
somaCross-platform CTF problem container manager
Stars: ✭ 23 (+35.29%)
Libc DatabaseBuild a database of libc offsets to simplify exploitation
Stars: ✭ 1,122 (+6500%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+7582.35%)
BinV👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (+47.06%)
CtfCTF write-ups and some wargame sites write-ups.
Stars: ✭ 157 (+823.53%)
ghidra2dwarf🐉 Export ghidra decompiled code to dwarf sections inside ELF binary
Stars: ✭ 135 (+694.12%)
ida2pwntoolsa IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn
Stars: ✭ 58 (+241.18%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+1623.53%)
nadbg👀Dynamic memory watcher/tracer/analyzer for CTF pwn
Stars: ✭ 51 (+200%)
heapinfoAn interactive memory info for pwning / exploiting
Stars: ✭ 96 (+464.71%)
PwndraA collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+2352.94%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+4600%)
Welpwn💖CTF pwn framework.
Stars: ✭ 284 (+1570.59%)
Pwn SandboxA sandbox to protect your pwn challenges being pwned in CTF AWD.
Stars: ✭ 81 (+376.47%)
Slideswon't maintain
Stars: ✭ 79 (+364.71%)
ExropAutomatic ROPChain Generation
Stars: ✭ 191 (+1023.53%)
House Of CorrosionA description of the "House of Corrosion" GLIBC heap exploitation technique.
Stars: ✭ 202 (+1088.24%)
Glibc All In One🎁A convenient glibc binary and debug file downloader and source code auto builder
Stars: ✭ 145 (+752.94%)
ctf-writeups📚 Yet another CTF writeups repository. PWN and RE tasks
Stars: ✭ 29 (+70.59%)
libc-dblibc database (file in packages, hash, package files, symbols). Raw binary libc available on https://github.com/BestPig/libc-bin)
Stars: ✭ 21 (+23.53%)
My-PWN-LifeThis is a PWN challenges repo.###### 1f y0u l1ke, g1v3 m3 a star~
Stars: ✭ 23 (+35.29%)
Pool2020💼 Pools organized for Epitech's students in 2020.
Stars: ✭ 14 (-17.65%)
minimal gdb🐛 Lightweight vim -> gdb broker which uses .gdbinit gdb config file to export breakpoints
Stars: ✭ 16 (-5.88%)
spellbookFramework for rapid development and reusable of security tools
Stars: ✭ 67 (+294.12%)
Enum.pyA tool to enumerate network services
Stars: ✭ 23 (+35.29%)
gdb-dashboardModular visual interface for GDB in Python
Stars: ✭ 8,699 (+51070.59%)
fhq-serverThis is an open source platform for competitions of computer security.
Stars: ✭ 33 (+94.12%)
webcocktailAn automatic and lightweight web application scanning tool for CTF.
Stars: ✭ 28 (+64.71%)
GitCTFGit-based CTF
Stars: ✭ 53 (+211.76%)
kakoune-gdbgdb integration plugin
Stars: ✭ 44 (+158.82%)
Flag-CaptureSolutions and write-ups from security-based competitions also known as Capture The Flag competition
Stars: ✭ 84 (+394.12%)
toshImagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...
Stars: ✭ 406 (+2288.24%)
BerylEnigma一个为渗透测试与CTF而制作的工具集,主要实现一些加解密的功能。
Stars: ✭ 329 (+1835.29%)