Backwards program slice stitching for automatic CTF problem solving.
☆50Mar 26, 2019Updated 7 years ago
Alternatives and similar repositories for Rocket-Shot
Users that are interested in Rocket-Shot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Symbolic Execution over Falcon IL☆30Mar 13, 2026Updated last week
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆11Dec 18, 2017Updated 8 years ago
- X/Y o-scope simulator for playing audio waveforms☆17Nov 28, 2015Updated 10 years ago
- rune - radare2 based symbolic emulator☆27Aug 29, 2017Updated 8 years ago
- ☆50Dec 17, 2020Updated 5 years ago
- Intermediate Representation for Binary analysis and transformation☆352Jan 14, 2026Updated 2 months ago
- A fully implemented kernel exploit for the PS4 on 5.05FW☆25May 28, 2018Updated 7 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆52Jul 11, 2020Updated 5 years ago
- Data and scripts for the paper "Polymorphic Type Inference for Machine Code"☆13Apr 12, 2016Updated 9 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆158Mar 3, 2021Updated 5 years ago
- IDAPro scripts/plugins☆93Feb 26, 2019Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆23May 22, 2019Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- RS232 data transfer library.☆10Oct 18, 2016Updated 9 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- RetDec Offline Decompiler☆46Feb 11, 2020Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆154Sep 21, 2018Updated 7 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- ☆17Oct 17, 2018Updated 7 years ago