☆28Jan 27, 2017Updated 9 years ago
Alternatives and similar repositories for Teaser-2017
Users that are interested in Teaser-2017 are comparing it to the libraries listed below
Sorting:
- ☆14Jun 25, 2019Updated 6 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- ☆89Sep 27, 2024Updated last year
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- IDA SDK tech demo☆39May 25, 2020Updated 5 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- ☆14Apr 28, 2016Updated 9 years ago
- gcc plugin to discover optimization passes used during compilation☆20Feb 10, 2021Updated 5 years ago
- ☆16May 22, 2014Updated 11 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- ELFDump is a C parser for ELF64 object files.☆23Apr 22, 2022Updated 3 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- Windows memory hacking library☆21Jul 14, 2016Updated 9 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- ☆93Jul 30, 2021Updated 4 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Jun 21, 2016Updated 9 years ago