TXOne-Networks / TCSALinks
☆39Updated 2 years ago
Alternatives and similar repositories for TCSA
Users that are interested in TCSA are comparing it to the libraries listed below
Sorting:
- MediaTek Fuzzing Workshop in HITCON 2021☆63Updated 3 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆34Updated 3 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Updated 2 years ago
- I am still working on it☆12Updated 5 years ago
- 試試你的好手氣☆34Updated last month
- Fuzzing tutorial with easy-to-learn labs 🚀☆161Updated 2 years ago
- CTF write-up☆34Updated last year
- Let's get familiar with Windows pwn 😎☆46Updated 5 years ago
- a ringcon based IDA Pro controller☆68Updated last year
- Linux kernel module implementation & exploitation (pwn) labs.☆195Updated 3 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆36Updated 4 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- BHUSA'24: Cuda-pretrained Inference Decompile Agent (CuIDA)☆15Updated 11 months ago
- QilingLab challenge writeup☆21Updated 3 years ago
- ☆11Updated 3 years ago
- Virtual Inheritance Reverse Engineering☆17Updated 4 years ago
- ☆18Updated 4 years ago
- angr tutorial for ctf☆152Updated 4 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated last month
- ☆72Updated last year
- Fuzzing with the generated argument☆34Updated 2 years ago
- ☆76Updated 2 years ago
- ☆94Updated 3 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆65Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 4 months ago
- The GhidraLookup plugin aims to help user lookup documentations of Win API functions.☆16Updated 3 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆187Updated 3 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- ☆82Updated 2 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆105Updated 10 months ago