Malformation / NotesLinks
Stuff that should be imprinted in the mind
☆34Updated 15 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- ☆34Updated 8 years ago
- ☆135Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- An interactive memory info for pwning / exploiting☆100Updated 2 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- ☆28Updated 8 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 weeks ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 6 years ago
- ☆159Updated 6 years ago
- ☆91Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated 2 years ago
- A library for patching ELFs☆57Updated 4 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- ☆87Updated 2 years ago
- ☆91Updated 6 years ago
- A Python tool to generate ROP chains☆64Updated 8 months ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆86Updated 9 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Updated 3 years ago
- various CTF writeups☆61Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 9 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago