Vector35 / csaw-2019-pwny-race
Challenges from CSAW 2019 Pwn Race Edition
☆12Updated 5 years ago
Alternatives and similar repositories for csaw-2019-pwny-race:
Users that are interested in csaw-2019-pwny-race are comparing it to the libraries listed below
- Automatic Vulnerability Discovery☆37Updated 5 years ago
- Recent Fuzzing Paper☆35Updated last year
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆111Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- ☆91Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Symbolic Execution Tool in r2☆104Updated 2 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- ☆63Updated 5 years ago
- vasilisk☆19Updated 5 years ago
- Patches to afl to fix bugs or add enhancements☆81Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 4 years ago
- ☆47Updated 4 years ago
- ☆15Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆206Updated 3 years ago
- Gave a talk on Vectorized emulation at Recon Montreal 2019, here are the slides☆16Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 8 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆27Updated 7 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆86Updated 5 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- binary ninja plugin for adding custom hooks to executables☆22Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- ☆88Updated 6 years ago
- realtime cross-tool collaborative reverse engineering☆99Updated 2 years ago