pwn
Kernel development & exploitation practice environment.
A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Example pwnable challenge hosted with docker
Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark.
kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see
A swiss army knife for pentesting networks
CTF framework and exploit development library
Scapy: the Python-based interactive packet manipulation program & library.
Implementation of an x86 CPU backdoor in Qemu with an exploit for Linux
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
A list of cyber-chef recipes and curated links
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
A repository for learning various heap exploitation techniques.
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
A collection of links related to Linux kernel security and exploitation
A set of Linux binary exploitation tasks for beginners on various architectures
A True Instrumentable Binary Emulation Framework
Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.