ChrisTheCoolHut / Instruction-StompView external linksLinks
Cross-architecture instruction counting for CTF solving
β48Mar 13, 2022Updated 3 years ago
Alternatives and similar repositories for Instruction-Stomp
Users that are interested in Instruction-Stomp are comparing it to the libraries listed below
Sorting:
- πDynamic memory watcher/tracer/analyzer for CTF pwnβ51Jul 11, 2020Updated 5 years ago
- Improving side channel analysis techniques for CTF problems.β12Oct 25, 2020Updated 5 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)β28Aug 10, 2019Updated 6 years ago
- Backwards program slice stitching for automatic CTF problem solving.β50Mar 26, 2019Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.β51Sep 9, 2018Updated 7 years ago
- β15May 23, 2019Updated 6 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.β16Jan 9, 2022Updated 4 years ago
- β16Jan 23, 2022Updated 4 years ago
- A tool for finding the one gadget RCE in libcβ77May 30, 2020Updated 5 years ago
- Find command injection and format string bugs in binariesβ17Feb 2, 2024Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflowβ¦β36Nov 18, 2020Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit developmentβ21Apr 21, 2019Updated 6 years ago
- Writeups for past CTFs I've joinedβ18Jun 1, 2021Updated 4 years ago
- β92Oct 24, 2018Updated 7 years ago
- This is a project I'm using to learn Rust and binary analysis.β11Jan 20, 2022Updated 4 years ago
- πHeap analysis tool for CTF pwn.β223May 4, 2021Updated 4 years ago
- Crystal Anti-Exploit Protection 2012β37May 31, 2020Updated 5 years ago
- Extract annoations from Ghidra into an X32/X64 dbg databaseβ57Feb 24, 2021Updated 4 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutionsβ13Oct 7, 2022Updated 3 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)β10Oct 18, 2018Updated 7 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)β28Aug 21, 2018Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.β194Aug 1, 2022Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive argumentsβ33Apr 10, 2022Updated 3 years ago
- β13Jul 31, 2020Updated 5 years ago
- Archive of Balsn CTF 2019β26Jan 16, 2020Updated 6 years ago
- Pharo bindings to the Unicorn machine code simulation libraryβ15Mar 18, 2025Updated 10 months ago
- BAP python bindingsβ22Dec 1, 2023Updated 2 years ago
- Emulating firmware poorly but quickly!β15Dec 18, 2020Updated 5 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysisβ12Oct 11, 2019Updated 6 years ago
- β12Mar 7, 2020Updated 5 years ago
- Diem (formerly Libra) Move VM decompiler plugin for JEBβ33Nov 1, 2023Updated 2 years ago
- δ»₯ε€ͺεεεηΊ¦δΊ€ζθ°θ―ε·₯ε ·β16Jul 20, 2021Updated 4 years ago
- POC for cve-2019-1458β21Mar 4, 2020Updated 5 years ago
- Home for issues on Binary Ninja Cloudβ16May 13, 2020Updated 5 years ago
- Code and exercises for a workshop on z3 and angrβ234Dec 29, 2020Updated 5 years ago
- AFLplusplus + libprotobuf-mutatorβ61Nov 7, 2022Updated 3 years ago
- A driver that supports communication between a Windows guest and HyperWinβ15Jan 6, 2021Updated 5 years ago
- Learn how to pwn badly written programsβ15Sep 18, 2018Updated 7 years ago
- β15Jul 25, 2019Updated 6 years ago