Lists (9)
Sort Name ascending (A-Z)
Stars
Binary Exploitation Skill. Gain RCE from arbitrary write.
Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel CVE debug.
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
PyTorch3D is FAIR's library of reusable components for deep learning with 3D data
🔮 ChatGPT Desktop Application (Mac, Windows and Linux)
A project based on Fine-tuned BERT to detect GLIBC vulnerabilities.
ChatWithBinary: Advanced AI-powered binary analysis tool leveraging OpenAI's LangChain technology, revolutionizing CTF Pwners' experience in binary file interpretation and vulnerability detection.
pwninit - automate starting binary exploit challenges
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX
一个高质量、经典计算机书籍推荐清单,特点为:只收集高质量,各方向经典书籍,不求书多,只求书精。
Build a database of libc offsets to simplify exploitation