Foxmole / PwnAdventure3Links
Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/
☆38Updated 7 years ago
Alternatives and similar repositories for PwnAdventure3
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
Sorting:
- ☆21Updated 6 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆93Updated 9 years ago
- A Python tool to generate ROP chains☆64Updated 7 months ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- various CTF writeups☆60Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆58Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆110Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆100Updated 2 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 11 months ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- ☆33Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Some of the Anti-Debugging Tricks☆27Updated 8 years ago
- Personal repository for all ctf related stuffs☆67Updated 9 months ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆57Updated 2 years ago