Hypersonic / CyberTronix64kLinks
Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan
☆10Updated 8 years ago
Alternatives and similar repositories for CyberTronix64k
Users that are interested in CyberTronix64k are comparing it to the libraries listed below
Sorting:
- The greatest tool to ever grace the computers of this earth 💯☆30Updated 6 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- 2016 DEF CON Qualifier Challenges☆179Updated 9 years ago
- Example queries for joern☆18Updated 8 years ago
- Python implementation of zzuf mutator - little bit-flip atomic bomb☆71Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- ☆82Updated 8 years ago
- ☆49Updated 4 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 11 years ago
- Simple shellcode testing tool.☆49Updated 13 years ago
- various CTF writeups☆60Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆93Updated 9 years ago
- ☆77Updated 10 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- ☆76Updated last year
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- ☆26Updated 9 years ago
- Binary analysis platform based on Octopus and Radare2☆78Updated 8 years ago
- IDA cLEMENCy Tools☆62Updated 7 years ago
- ☆124Updated 4 years ago
- Symbolic Execution Tool in r2☆105Updated 3 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- ☆21Updated 7 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 10 years ago
- GlibC Malloc for Exploiters presentation☆148Updated 6 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆137Updated 10 months ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 weeks ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago