NoviceLive / bintut
Teach you a binary exploitation for great good.
☆292Updated 6 years ago
Alternatives and similar repositories for bintut:
Users that are interested in bintut are comparing it to the libraries listed below
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 6 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- Repository to train/learn memory corruption on the ARM platform.☆351Updated 7 years ago
- Deprecated Binary Ninja prototype written in Python☆522Updated 4 years ago
- An evolutionary knowledge-based fuzzer☆270Updated 10 months ago
- Hodor! Fuzzer..☆128Updated 8 years ago
- random brain dumps☆345Updated 7 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆383Updated 6 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆447Updated 9 years ago
- ☆279Updated 4 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- LLDB MCP Integration + other helpful commands☆690Updated this week
- PyAna - Analyzing the Windows shellcode☆246Updated 9 years ago
- A tool to help you write binary exploits☆609Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆252Updated 5 years ago
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago
- binary patching from Python☆635Updated last year
- Radare Congress Stuff☆208Updated 4 months ago
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated this week
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- CTF Writeups☆186Updated 7 years ago
- A tool for predicting the output of random number generators☆190Updated 7 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆324Updated 3 years ago
- Simplify format string exploitation.☆338Updated 3 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆158Updated 8 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Updated 9 years ago