TechSecCTF / z3_splash_classLinks
This repo holds materials for our Splash 2017 class on Z3.
☆26Updated 8 years ago
Alternatives and similar repositories for z3_splash_class
Users that are interested in z3_splash_class are comparing it to the libraries listed below
Sorting:
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- ☆26Updated 7 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- Recent Fuzzing Paper☆36Updated 2 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- ☆88Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆138Updated last year
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- various CTF writeups☆61Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Updated 5 years ago
- ☆92Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆233Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- ☆52Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- realtime cross-tool collaborative reverse engineering