Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations
☆14Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for cgc2elf
Users that are interested in cgc2elf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DARPA Cyber Grand Challenge Challenge Binary Testing tools☆31Jan 24, 2018Updated 8 years ago
- Repository in which the CGC team will post technical answers during the scored events and qualification event.☆17Aug 7, 2016Updated 9 years ago
- DARPA Cyber Grand Challenge Documentation☆118Feb 1, 2017Updated 9 years ago
- CFE virtual competition framework☆14Feb 1, 2017Updated 9 years ago
- DARPA Cyber Grand Challenge Linux source code☆18Jul 9, 2015Updated 10 years ago
- Nerve is a cross platform hit tracer built on Ragweed☆47Dec 6, 2011Updated 14 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- ☆23Jan 10, 2012Updated 14 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 7 years ago
- Allows to execute haskell code in Ida Pro.☆27Dec 22, 2015Updated 10 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- Haxxis Visualization System☆26May 22, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- Lego Dimensions Toy Pad library for NodeJS☆14Dec 28, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- A repository with binaries for angr tests and examples.☆64Mar 18, 2026Updated last week
- ☆17Oct 5, 2020Updated 5 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆331Jun 6, 2018Updated 7 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- my automatic exploit generation (DEPRECATED)☆59Jun 21, 2016Updated 9 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago