AvalZ / regrets
Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"
☆26Updated last year
Related projects ⓘ
Alternatives and complementary repositories for regrets
- A tool for firmware cartography☆138Updated 8 months ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆169Updated 2 months ago
- Simple volatility profile builder based on Docker container☆22Updated 4 years ago
- Fuzz anything with Program Environment Fuzzing☆352Updated 2 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆78Updated last year
- Network analysis tool for Attack Defence CTF☆284Updated 4 months ago
- ☆96Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆108Updated last month
- ☆157Updated 2 years ago
- ☆42Updated 2 years ago
- An Intrusion Prevention System for Attack-Defense CTFs☆36Updated 4 months ago
- PASTIS: Collaborative Fuzzing Framework☆157Updated 3 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆357Updated last year
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆298Updated 2 years ago
- ☆306Updated 5 months ago
- 🐍 Solving CTF challenges using Z3 and Python☆50Updated last year
- A coverage-guided REST API fuzzer developed on top of LibAFL☆92Updated this week
- A structure-aware HTTP fuzzing library☆206Updated last year
- An automatic Blind ROP exploitation tool☆190Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆42Updated 6 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆589Updated 4 months ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆40Updated last year
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆61Updated 7 months ago
- Source code for the 2022 DEF CON Qualifiers.☆264Updated 5 months ago
- Where CTFs happen☆77Updated 5 months ago
- Research notes☆115Updated last month
- TCP flow analyzer with sugar for A/D CTF☆138Updated last year