TechSecCTF / z3_splash_classLinks
This repo holds materials for our Splash 2017 class on Z3.
☆26Updated 8 years ago
Alternatives and similar repositories for z3_splash_class
Users that are interested in z3_splash_class are comparing it to the libraries listed below
Sorting:
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- ☆91Updated 6 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- Some kernel exploits☆145Updated 8 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- ☆26Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- Recent Fuzzing Paper☆36Updated 2 years ago
- Attacking the Core associated source files☆88Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- ☆81Updated 8 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- ☆52Updated 4 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 5 months ago
- Repo for CSAW CTF 2018 Finals challenges☆55Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- Automated fuzzing framework☆120Updated 2 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- ☆49Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Updated 6 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- An interactive memory info for pwning / exploiting☆99Updated 2 years ago
- ☆40Updated 7 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago