Ayrx / reutilsLinks
A collection of scripts to aid in reverse engineering and exploit development.
☆24Updated 4 years ago
Alternatives and similar repositories for reutils
Users that are interested in reutils are comparing it to the libraries listed below
Sorting:
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- A library for patching ELFs☆62Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- ☆85Updated 3 years ago
- ☆36Updated 5 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 4 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- ☆72Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- ☆76Updated 4 years ago
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆62Updated 3 weeks ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 5 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Updated 6 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last month
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Updated 5 years ago
- This repository will be containing all kind of additional resources that I think might be useful for someone fuzzing document (pdf, doc, …☆15Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- ☆12Updated last week
- Cross-architecture instruction counting for CTF solving☆48Updated 3 years ago
- ☆80Updated 3 years ago