GoSecure / advanced-binary-analysis
Materials for the Binary Analysis Workshop presented at NorthSec 2020
☆68Updated 4 years ago
Alternatives and similar repositories for advanced-binary-analysis:
Users that are interested in advanced-binary-analysis are comparing it to the libraries listed below
- ☆48Updated 3 years ago
- ☆49Updated 4 years ago
- ☆88Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆193Updated 2 years ago
- The Dumb Network Fuzzer☆20Updated last year
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- A library for patching ELFs☆55Updated 4 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆48Updated last year
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 2 months ago
- ☆85Updated last year
- A collection of curated resources and CVEs I use for research.☆104Updated 3 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- ☆78Updated 2 months ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- ☆20Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- ☆153Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆60Updated last year
- A tool for finding the one gadget RCE in libc☆76Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆186Updated last year
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 7 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 3 months ago
- A repository for my conference presentations☆35Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆32Updated 4 years ago
- Malware dynamic instrumentation tool based on frida framework☆105Updated 4 years ago
- ☆61Updated 2 months ago