Insomnihack / Insomnihack-2017Links
☆10Updated 8 years ago
Alternatives and similar repositories for Insomnihack-2017
Users that are interested in Insomnihack-2017 are comparing it to the libraries listed below
Sorting:
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- softScheck Cloud Fuzzing Framework☆58Updated 7 years ago
- Simple shellcode testing tool.☆49Updated 13 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Radare 2 wiki☆93Updated 5 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- TrueType Font Fuzzer☆53Updated 9 years ago
- IDA cLEMENCy Tools☆62Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- various CTF writeups☆60Updated 6 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Personal repository for all ctf related stuffs☆67Updated 7 months ago
- ☆49Updated 7 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆44Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago