generate and search pattern string for exploit development
☆201Feb 5, 2025Updated last year
Alternatives and similar repositories for exploit-pattern
Users that are interested in exploit-pattern are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementation of Metasploit's pattern_create/pattern_offset.☆74Dec 9, 2019Updated 6 years ago
- 一步一步学ROP☆570Dec 16, 2015Updated 10 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- CVE-2014-0816☆26Oct 5, 2016Updated 9 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,110Jul 29, 2024Updated last year
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,402Dec 16, 2025Updated 4 months ago
- IDA Pro Scripts☆37Feb 24, 2015Updated 11 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- IDA Signsrch☆161Jul 14, 2015Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- CTF framework and exploit development library☆13,360Apr 7, 2026Updated last week
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆332Mar 26, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,319Updated this week
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆306Jan 12, 2023Updated 3 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- Exploitation and Mitigation Slides☆136Jun 4, 2024Updated last year
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- LLVM Obfuscator☆48Sep 13, 2016Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- ☆28Oct 21, 2016Updated 9 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- BSidesCBR CTF docker compose files☆66Jun 4, 2020Updated 5 years ago
- A list of IDA Plugins☆3,821May 31, 2024Updated last year
- ☆79May 13, 2016Updated 9 years ago