I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.
☆25Apr 7, 2015Updated 11 years ago
Alternatives and similar repositories for exploit-exercises-arm
Users that are interested in exploit-exercises-arm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nVidia Shield TV fastboot bootloader☆14Dec 5, 2018Updated 7 years ago
- symbolic execution engine for brainfuck because lol☆14Feb 5, 2017Updated 9 years ago
- Advanced: Bluetooth low energy capture the flag☆65Aug 4, 2023Updated 2 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- x86 / x64 Processor Manual for Binary Ninja☆16Mar 7, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- collection of translation documents.☆16Mar 31, 2019Updated 7 years ago
- legacy MTK devices preLoader from Mediatek☆22Apr 29, 2024Updated last year
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Retroid Pocket 2 kernel from Retroid☆12Dec 27, 2022Updated 3 years ago
- Overlay chroot☆17Apr 16, 2020Updated 5 years ago
- Symbolic Execution over Falcon IL☆30Mar 13, 2026Updated 3 weeks ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- CSAW Embedded Security Challenge 2020☆26Nov 11, 2020Updated 5 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- ☆10Apr 13, 2022Updated 3 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- Web Exploitation Workflow for CTF Challenges☆54Dec 11, 2016Updated 9 years ago
- White-box Design and Analysis kit☆24May 22, 2023Updated 2 years ago
- System programming & Algorithm ― Linux programming☆14Feb 22, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A place for disclosing things☆43Jul 27, 2016Updated 9 years ago
- [CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow☆36Jan 15, 2018Updated 8 years ago
- A PNG file-smuggling tool and library!☆27Mar 15, 2023Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆964Mar 14, 2022Updated 4 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- Tutorial on how to run OP-TEE on the Raspberry Pi 5.☆23Nov 3, 2025Updated 5 months ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- A simpler alternative to the Noise protocol framework.☆23Jan 6, 2021Updated 5 years ago
- easy_Pwn☆19Apr 19, 2019Updated 6 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago