CTF framework and exploit development library
-
Updated
Aug 29, 2021 - Python
{{ message }}
CTF framework and exploit development library
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers
An in depth tutorial on how to do binary exploitation
unified io lib for pwning development written in python
Exploiting challenges in Linux and Windows
Very simple script(s) to hasten binary exploit creation
a IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn
ELF parser library implemented in pure Ruby!
Intel x86_64 assembly language and pwntools dash docset
Reverse/ Bind Shell Generator for cross platform systems
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
SSH brute-force script created for HackTheBox
My solutions for the ROP Emporium challenges (https://ropemporium.com/). For each challenge, a solution based on plain Python (exp_plain.py) and based on Pwntools is provided.
A tool for patching binaries to use specific versions of glibc
Vagrant-based CTF VM
Here are some examples and solution of CTF Reverse Engineering and Pwning challenges where I have participated and solved using many tools such as Z3, Angr, IDA Pro and others software and tools.
Add a description, image, and links to the pwntools topic page so that developers can more easily learn about it.
To associate your repository with the pwntools topic, visit your repo's landing page and select "manage topics."