Skip to content
View x0nu11byt3's full-sized avatar

Block or report x0nu11byt3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

pwn

pwncollege, escalation privileges & more
40 repositories

Kernel development & exploitation practice environment.

C 218 31 Updated Sep 10, 2023

A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.

1,334 150 Updated May 31, 2024

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 16,464 1,855 Updated Nov 25, 2024

low cost software radio platform

C 6,808 1,567 Updated Jan 9, 2025

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python 8,107 933 Updated Feb 13, 2025

Example pwnable challenge hosted with docker

Dockerfile 216 45 Updated Feb 28, 2024

Material for the YouTube series

C 505 212 Updated Apr 1, 2022

PwnAdventure3 Server

C++ 639 134 Updated Oct 5, 2021

Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark. ⚠️ GitHub won't let us disable pull requests. ⚠️ THEY WILL BE IGNORED HERE ⚠️ Upload them at GitLab instead.

C 7,589 1,923 Updated Feb 13, 2025

kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see

Go 675 70 Updated Sep 15, 2024

Perfect Blue's CTF Writeups

Max 673 52 Updated Jun 24, 2024

A swiss army knife for pentesting networks

Python 8,572 1,653 Updated Dec 6, 2023

CTF framework and exploit development library

Python 12,347 1,736 Updated Jan 29, 2025

Scapy: the Python-based interactive packet manipulation program & library.

Python 11,069 2,063 Updated Feb 6, 2025

Implementation of an x86 CPU backdoor in Qemu with an exploit for Linux

C 2 Updated Sep 8, 2020

HW Trojan in SPARC for QEMU

C 2 Updated Jun 1, 2018

Feature-rich Post Exploitation Framework with Network Pivoting capabilities.

C 96 26 Updated May 15, 2021

A list of cyber-chef recipes and curated links

2,056 261 Updated Jun 14, 2024

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

JavaScript 30,191 3,373 Updated Feb 12, 2025

CVE-2021-3156 - Sudo Baron Samedit

C 222 35 Updated Feb 12, 2022

Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest

Python 220 90 Updated Aug 28, 2024

A repository for learning various heap exploitation techniques.

C 7,500 1,166 Updated Jan 28, 2025

Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.

Python 124 24 Updated Apr 25, 2022

A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.

Shell 813 83 Updated Jun 9, 2023

A collection of links related to Linux kernel security and exploitation

5,769 988 Updated Jan 5, 2025

A set of Linux binary exploitation tasks for beginners on various architectures

Python 528 93 Updated Dec 26, 2021

A True Instrumentable Binary Emulation Framework

Python 5,243 736 Updated Jan 20, 2025

Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them

C 265 55 Updated Sep 19, 2017

Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.

Assembly 179 38 Updated Feb 2, 2022
Python 201 48 Updated Oct 27, 2024