Malformation / NotesLinks
Stuff that should be imprinted in the mind
☆33Updated 15 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- ☆135Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- ☆28Updated 8 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆33Updated 8 years ago
- A library for patching ELFs☆57Updated 4 years ago
- ☆90Updated 6 years ago
- ☆85Updated last year
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- ☆161Updated 5 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆88Updated 2 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 9 months ago
- ☆72Updated 4 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- ☆91Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- An interactive memory info for pwning / exploiting☆102Updated 2 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 5 months ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year