SPGryphons / GryphonCTF2016-ChallengesLinks
GryphonCTF 2016 Challenges Repository.
☆17Updated 7 years ago
Alternatives and similar repositories for GryphonCTF2016-Challenges
Users that are interested in GryphonCTF2016-Challenges are comparing it to the libraries listed below
Sorting:
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Vulnerability research and development.☆25Updated 10 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- ☆33Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- ☆45Updated 7 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Updated 10 years ago
- ☆26Updated 10 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- A Python tool to generate ROP chains☆64Updated 6 months ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- ☆24Updated 9 years ago