auto-ropper
☆17Jul 7, 2022Updated 3 years ago
Alternatives and similar repositories for auto-ropper
Users that are interested in auto-ropper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 3 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- ☆27Nov 30, 2024Updated last year
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- A simple windows driver that can read and write to process memory from kernel mode☆11Aug 31, 2021Updated 4 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- A kernel level driver for Windows built to configure the Blue Screen Of Death☆21Jul 30, 2021Updated 4 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆111Apr 8, 2024Updated last year
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Target-centric program analysis.☆76Mar 16, 2026Updated last week
- ☆28Apr 18, 2024Updated last year
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆18Apr 8, 2023Updated 2 years ago
- ☆57Apr 8, 2024Updated last year
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆35Jan 25, 2025Updated last year
- My personnal repository☆10Sep 2, 2025Updated 6 months ago
- A tool for finding the one gadget RCE in libc☆76May 30, 2020Updated 5 years ago
- binary ninja related code☆37Mar 27, 2025Updated 11 months ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- Rode0day API Client☆18Jan 9, 2019Updated 7 years ago
- A command-line tool for testing RocketMQ vulnerabilities.☆13Feb 7, 2025Updated last year
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- Automatically attempts to solve simple CTF steganography challenges by running many existing tools and searching the output for a flag fo…☆24May 1, 2019Updated 6 years ago
- ☆10Feb 6, 2020Updated 6 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- Our CTF Write-Up / solve scripts☆22Aug 21, 2023Updated 2 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago