Find command injection and format string bugs in binaries
☆16Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for bcheck
Users that are interested in bcheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rode0day API Client☆18Jan 9, 2019Updated 7 years ago
- angr's exploration technique to perform taint analysis☆62Mar 26, 2020Updated 6 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- Example scripts using angr☆48Jan 26, 2026Updated 3 months ago
- Material and examples for a presentation on static binary analysis.☆47Mar 15, 2021Updated 5 years ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- ☆24Jan 27, 2026Updated 3 months ago
- 二维碎片拼接复原☆13Aug 9, 2019Updated 6 years ago
- ☆11Jul 31, 2024Updated last year
- Very WIP taint analysis for DynamoRIO (ARM)☆21Apr 10, 2018Updated 8 years ago
- BAP python bindings☆23Dec 1, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- scu-ctf平台上题目的Writeup☆14Oct 30, 2023Updated 2 years ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆19Apr 8, 2023Updated 3 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- My PWN 练习题,异构PWN技能栈,适合IoT安全研究者。☆48Jan 5, 2022Updated 4 years ago
- My personnal repository☆10Sep 2, 2025Updated 8 months ago
- 根据函数地址查询libc,可本地或在线查询☆17Nov 29, 2021Updated 4 years ago
- deploy bubble app using docker☆23Jun 1, 2023Updated 2 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 5 months ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- 基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ☆52Dec 26, 2024Updated last year
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 5 months ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 10 years ago
- LLVM-based ROP obfuscated compiler☆12Mar 24, 2022Updated 4 years ago
- 纪录自己学习go的过程和一些常见八股文☆24Apr 14, 2023Updated 3 years ago
- ☆16Jul 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆426Sep 18, 2021Updated 4 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- ☆21Oct 1, 2025Updated 7 months ago
- Universal root exploit for the linux kernel☆37Apr 30, 2024Updated 2 years ago
- A V8 Sandbox Escape Technique.☆34Jul 4, 2024Updated last year
- redpwn's challenge deployment system☆29Dec 22, 2023Updated 2 years ago
- ☆98May 4, 2025Updated last year