TechSecCTF / z3_splash_classLinks
This repo holds materials for our Splash 2017 class on Z3.
☆26Updated 8 years ago
Alternatives and similar repositories for z3_splash_class
Users that are interested in z3_splash_class are comparing it to the libraries listed below
Sorting:
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- ☆89Updated 7 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 6 years ago
- ☆26Updated 7 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- Symbolic Execution Tool in r2☆106Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆223Updated 7 months ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 9 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Updated 5 years ago
- Recent Fuzzing Paper☆36Updated 2 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- Repo for CSAW CTF 2018 Finals challenges☆55Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Updated 6 years ago
- ☆52Updated 4 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- ☆49Updated 7 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago