Find command injection and format string bugs in binaries
☆17Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for bcheck
Users that are interested in bcheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rode0day API Client☆18Jan 9, 2019Updated 7 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 5 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- Example scripts using angr☆48Jan 26, 2026Updated last month
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- ☆23Jan 27, 2026Updated last month
- ☆12Jul 31, 2024Updated last year
- Very WIP taint analysis for DynamoRIO (ARM)☆21Apr 10, 2018Updated 7 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Emulating firmware poorly but quickly!☆16Dec 18, 2020Updated 5 years ago
- scu-ctf平台上题目的Writeup☆13Oct 30, 2023Updated 2 years ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆18Apr 8, 2023Updated 2 years ago
- ctf kernel pwn☆16Mar 21, 2024Updated 2 years ago
- My PWN 练习题,异构PWN技能栈,适合IoT安全研究者。☆48Jan 5, 2022Updated 4 years ago
- My personnal repository☆10Sep 2, 2025Updated 6 months ago
- deploy bubble app using docker☆23Jun 1, 2023Updated 2 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 4 months ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- 基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ☆54Dec 26, 2024Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 10 years ago
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 4 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- 纪录自己学习go的过程和一些常见八股文☆24Apr 14, 2023Updated 2 years ago
- ☆16Jul 17, 2024Updated last year
- ☆16Jul 18, 2024Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆19Nov 27, 2024Updated last year
- ☆18Oct 1, 2025Updated 5 months ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year