Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations
☆14Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for cgc2elf
Users that are interested in cgc2elf are comparing it to the libraries listed below
Sorting:
- DARPA Cyber Grand Challenge Challenge Binary Testing tools☆30Jan 24, 2018Updated 8 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Feb 1, 2017Updated 9 years ago
- Repository in which the CGC team will post technical answers during the scored events and qualification event.☆17Aug 7, 2016Updated 9 years ago
- DARPA Cyber Grand Challenge Documentation☆117Feb 1, 2017Updated 9 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- DARPA Cyber Grand Challenge Linux source code☆17Jul 9, 2015Updated 10 years ago
- GNU Binutils ported to support DARPA Cyber Grand Challenge☆74Feb 1, 2017Updated 9 years ago
- CFE virtual competition framework☆14Feb 1, 2017Updated 9 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Allows to execute haskell code in Ida Pro.☆27Dec 22, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Nerve is a cross platform hit tracer built on Ragweed☆47Dec 6, 2011Updated 14 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- PathArmor context-sensitive CFI implementation☆45Oct 26, 2015Updated 10 years ago
- A collection of custom scripts for use with Hopper disassembler☆24Feb 10, 2015Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- ARM9 emulator☆22Mar 1, 2011Updated 15 years ago
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- Barely working LLVM mode for AFL on OSX☆20Dec 22, 2016Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- A repository with binaries for angr tests and examples.☆63Feb 24, 2026Updated last week
- Haxxis Visualization System☆26May 22, 2017Updated 8 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 7 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago