Malformation / Notes
Stuff that should be imprinted in the mind
☆33Updated 14 years ago
Alternatives and similar repositories for Notes:
Users that are interested in Notes are comparing it to the libraries listed below
- ☆28Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆134Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- ☆84Updated last year
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual…☆50Updated 8 years ago
- A Python tool to generate ROP chains☆60Updated 2 months ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 6 months ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- For code snippets and information☆41Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- msp430 Architecture plugin for Binary Ninja☆32Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ☆33Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆203Updated last year
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- ☆72Updated 3 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- realtime cross-tool collaborative reverse engineering☆99Updated 2 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆55Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago