0xKira / pedaLinks
PEDA - Python Exploit Development Assistance for GDB
☆23Updated last year
Alternatives and similar repositories for peda
Users that are interested in peda are comparing it to the libraries listed below
Sorting:
- ☆78Updated 4 months ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 9 months ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 4 months ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆53Updated 2 months ago
- ☆33Updated 5 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆21Updated 5 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- A collection of curated resources and CVEs I use for research.☆106Updated 3 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆61Updated 6 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- ☆32Updated 5 months ago
- ☆34Updated 3 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆49Updated last year
- A Webkit RCE exploit and an SBX bug☆33Updated 6 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- ☆26Updated 3 years ago
- CVE 2019-5791 working exploit☆21Updated 5 years ago
- HN Security's advisories.☆22Updated 2 months ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- ☆43Updated 4 years ago
- ☆37Updated 6 years ago
- Research related☆88Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago