Somerset-Recon / blog
For code snippets and information
☆41Updated 5 years ago
Alternatives and similar repositories for blog:
Users that are interested in blog are comparing it to the libraries listed below
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆39Updated 6 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- ☆44Updated 6 years ago
- ☆50Updated 7 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- ☆47Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- exploit development☆49Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 3 years ago
- python and honggfuzz☆25Updated 4 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- ☆100Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago