Foxmole / PwnAdventure3Links
Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/
☆38Updated 7 years ago
Alternatives and similar repositories for PwnAdventure3
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- IDA binary differ. Since code.google.com/p/patchdiff2/ seemed abandoned, I did the obvious thing…☆63Updated 10 years ago
- A Python tool to generate ROP chains☆63Updated 4 months ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- various CTF writeups☆60Updated 6 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- ☆43Updated 6 years ago
- ☆22Updated 7 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Updated 5 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆57Updated 2 years ago
- ☆21Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- IDA Pro findcrypt2 plug-in with MMX AES instruction finding support☆56Updated 12 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆58Updated 4 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆64Updated 10 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆73Updated 4 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago