auto-ropper
☆17Jul 7, 2022Updated 3 years ago
Alternatives and similar repositories for auto-ropper
Users that are interested in auto-ropper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- I will upload challenges I create for various ctf's or educational purposes here.☆24Apr 3, 2022Updated 4 years ago
- uploads unlimited files to mega.nz without a subscription☆12Mar 19, 2026Updated last month
- ☆29Nov 30, 2024Updated last year
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆112Apr 8, 2024Updated 2 years ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆32Jul 14, 2025Updated 9 months ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- BAP python bindings☆23Dec 1, 2023Updated 2 years ago
- Emulating firmware poorly but quickly!☆17Dec 18, 2020Updated 5 years ago
- Target-centric program analysis.☆75Mar 16, 2026Updated last month
- ☆28Apr 18, 2024Updated 2 years ago
- Tensilica Xtensa Architecture Plugin and ESP8266 Firmware Loader for Binary Ninja☆19Apr 8, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆35Jan 25, 2025Updated last year
- My personnal repository☆10Sep 2, 2025Updated 8 months ago
- A tool for finding the one gadget RCE in libc☆77May 30, 2020Updated 5 years ago
- binary ninja related code☆37Mar 27, 2025Updated last year
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- A command-line tool for testing RocketMQ vulnerabilities.☆13Feb 7, 2025Updated last year
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆34Apr 22, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- pwntools library implementation in c++☆49Apr 11, 2021Updated 5 years ago
- Find command injection and format string bugs in binaries☆16Feb 2, 2024Updated 2 years ago
- CTF challenges from redpwnCTF 2020☆60Sep 4, 2020Updated 5 years ago
- Automatically attempts to solve simple CTF steganography challenges by running many existing tools and searching the output for a flag fo…☆25May 1, 2019Updated 7 years ago
- CVE-2022-25943☆58Mar 9, 2022Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 4 years ago