ChrisTheCoolHut / Rocket-ShotView external linksLinks
Backwards program slice stitching for automatic CTF problem solving.
☆50Mar 26, 2019Updated 6 years ago
Alternatives and similar repositories for Rocket-Shot
Users that are interested in Rocket-Shot are comparing it to the libraries listed below
Sorting:
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Sep 10, 2023Updated 2 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- Collection of (at time of release) iOS bugs I found☆56Jan 28, 2020Updated 6 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- rune - radare2 based symbolic emulator☆27Aug 29, 2017Updated 8 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Mar 3, 2021Updated 4 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated last year
- Intermediate Representation for Binary analysis and transformation☆349Jan 14, 2026Updated 3 weeks ago
- RetDec Offline Decompiler☆46Feb 11, 2020Updated 6 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 8 years ago
- ☆13Apr 6, 2016Updated 9 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆11Dec 18, 2017Updated 8 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- It's Christmas time, you know what it is☆11Apr 5, 2015Updated 10 years ago
- a plugin to calculate complexity of executable's functions☆18May 17, 2022Updated 3 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- ☆140Dec 31, 2019Updated 6 years ago
- Fast and stealth WordPress scanner, no api-key, no limitation. Use the top-notch free open-source API www.wpvulnerability.net I'm lookin…☆17Jul 14, 2024Updated last year
- ☆21Sep 6, 2018Updated 7 years ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆83Mar 21, 2024Updated last year