Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/
☆38Oct 19, 2017Updated 8 years ago
Alternatives and similar repositories for PwnAdventure3
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
Sorting:
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Oct 15, 2022Updated 3 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- code emulator base on unicorn engine☆51Apr 23, 2018Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- ☆74Aug 12, 2020Updated 5 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Tutorial to write qemu plugins☆34Jun 22, 2017Updated 8 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Java integration for Hex-Rays IDA Pro☆26Feb 15, 2017Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- ☆15Oct 4, 2012Updated 13 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- ☆18Feb 6, 2019Updated 7 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Radare2 plugin to parse modern iOS 64-bit kernel caches☆28Mar 10, 2019Updated 6 years ago