Foxmole / PwnAdventure3
Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/
☆37Updated 7 years ago
Alternatives and similar repositories for PwnAdventure3:
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- A Python tool to generate ROP chains☆60Updated last month
- various CTF writeups☆60Updated 6 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- ☆21Updated 6 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆56Updated 2 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Writeups for my reverse engineering shanenagins☆42Updated 6 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- kernel exploitation helper class☆76Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Automatically exported from code.google.com/p/narly☆23Updated 3 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆99Updated 2 years ago
- ☆22Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- IDA binary differ. Since code.google.com/p/patchdiff2/ seemed abandoned, I did the obvious thing…☆63Updated 9 years ago