0xKira / pedaLinks
PEDA - Python Exploit Development Assistance for GDB
☆23Updated 5 months ago
Alternatives and similar repositories for peda
Users that are interested in peda are comparing it to the libraries listed below
Sorting:
- Research related☆89Updated 3 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Updated 2 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆149Updated 2 years ago
- ☆89Updated 3 years ago
- ☆157Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 3 weeks ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Updated 5 years ago
- ☆45Updated 4 years ago
- ☆80Updated 10 months ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- tools for shellcoding☆58Updated 2 years ago
- ☆98Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- ☆26Updated 4 months ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Cisco IOS Exploit Framework☆22Updated 6 years ago
- HITCON CTF 2018☆46Updated 7 years ago
- Automatic vulnerability detection and exploit generation☆16Updated 6 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 7 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- Automatic ROPChain Generation☆293Updated 5 years ago
- ☆68Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago