Foxmole / PwnAdventure3Links
Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/
☆38Updated 8 years ago
Alternatives and similar repositories for PwnAdventure3
Users that are interested in PwnAdventure3 are comparing it to the libraries listed below
Sorting:
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆93Updated 9 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- A Python tool to generate ROP chains☆64Updated 8 months ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- ☆21Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- various CTF writeups☆61Updated 7 years ago
- Collection of pin tools☆52Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆43Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 11 months ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Updated 3 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 11 years ago
- Radare 2 wiki☆94Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆91Updated 6 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆58Updated 4 years ago
- ☆35Updated 10 years ago
- ☆26Updated 9 years ago
- IDA binary differ. Since code.google.com/p/patchdiff2/ seemed abandoned, I did the obvious thing…☆63Updated 10 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago