HackerDom / ructf-2016
RuCTF 2016 repository
☆16Updated 5 years ago
Alternatives and similar repositories for ructf-2016
Users that are interested in ructf-2016 are comparing it to the libraries listed below
Sorting:
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆32Updated 6 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- ☆36Updated 12 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Memory awesomeness.☆29Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆34Updated 8 years ago
- ☆38Updated 9 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Some RSA attacks with sage☆11Updated 8 years ago
- ☆49Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- ☆11Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆18Updated 8 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Symbol REPL☆31Updated 7 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Write ups☆16Updated 7 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago