0xSoEasY / angr-wrapperLinks
angr-wrapper is a simple script to automatise and accelerate your basic use of angr (to solve CTF challenges for example)
☆14Updated 4 years ago
Alternatives and similar repositories for angr-wrapper
Users that are interested in angr-wrapper are comparing it to the libraries listed below
Sorting:
- ☆51Updated 3 years ago
- ☆45Updated 4 months ago
- Collection of pwn techniques☆29Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆133Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆280Updated 2 weeks ago
- Binary Golf Grand Prix☆81Updated last week
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆60Updated 2 months ago
- ☆178Updated 3 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated last month
- archive of the released challenges from corCTF 2021☆25Updated 4 years ago
- A Pythonic Ghidra standard library☆179Updated 2 months ago
- ASLR bypass without infoleak☆165Updated 4 years ago
- FSOP Again☆31Updated 3 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- Binary Type Inference Ghidra Plugin☆168Updated last year
- An educational Bochs-based snapshot fuzzer project☆226Updated 2 months ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆540Updated 7 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22Updated 3 years ago
- Code Coverage Exploration Plugin for Ghidra☆372Updated last year
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆40Updated 2 years ago
- Source for BuckeyeCTF 2022 challenges☆28Updated 3 years ago
- CTF write-ups☆100Updated 4 months ago
- Udemy – Linux Heap Exploitation☆54Updated 4 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆86Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Updated 3 years ago