Malformation / NotesLinks
Stuff that should be imprinted in the mind
☆33Updated 15 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- ☆28Updated 8 years ago
- ☆85Updated last year
- A BinaryNinja plugin to graph a BNIL instruction tree☆87Updated last year
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆90Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- A library for patching ELFs☆56Updated 4 years ago
- ☆135Updated 5 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- CTF write-ups / solution scripts☆23Updated 6 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- various CTF writeups☆60Updated 6 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- ☆33Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated this week
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 9 months ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual…☆50Updated 8 years ago
- GlibC Malloc for Exploiters presentation☆147Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago