Ayrx / reutilsLinks
A collection of scripts to aid in reverse engineering and exploit development.
☆24Updated 4 years ago
Alternatives and similar repositories for reutils
Users that are interested in reutils are comparing it to the libraries listed below
Sorting:
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Updated 2 years ago
- A library for patching ELFs☆57Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆82Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆11Updated 2 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 8 months ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- ☆36Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last year
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 4 months ago
- ☆76Updated 4 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated 7 months ago
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆55Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- ☆78Updated 3 years ago
- weggli ruleset scanner for source code and binaries☆32Updated last month
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago