OktaSecurityLabs / hack_url_reLinks
Automatic hacking tool for URL regexes.
☆11Updated 4 years ago
Alternatives and similar repositories for hack_url_re
Users that are interested in hack_url_re are comparing it to the libraries listed below
Sorting:
- Recent Fuzzing Paper☆36Updated 2 years ago
- QL Workshop☆16Updated 6 years ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Updated 6 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- Target-centric program analysis.☆76Updated 3 weeks ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Updated 3 years ago
- Reference material for fuzzing and creating fuzzers☆19Updated 6 years ago
- Pandemic binary program analysis framework in OCaml (abandoned)☆71Updated 6 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆95Updated 2 years ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Updated 2 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- A PCode Emulator for Ghidra.☆112Updated 5 years ago
- Automated fuzzing framework☆120Updated 3 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Updated 7 years ago
- A binary analysis framework☆133Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated last year
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Updated 6 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Updated 5 years ago