abatchy17 / ROP-EmporiumView external linksLinks
Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.
☆37Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for ROP-Emporium
Users that are interested in ROP-Emporium are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Write-ups about challenges in http://reversing.kr/challenge.php☆47Sep 19, 2018Updated 7 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- Produce code coverage reports for AFL++ fuzzing campaigns with source code or in binary-only mode☆31Jul 18, 2025Updated 6 months ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- ☆111Dec 30, 2019Updated 6 years ago
- Simple driver loader for windows☆17May 22, 2020Updated 5 years ago
- [F]aster [U]niversal [U]npacker☆60Jul 27, 2013Updated 12 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- ☆27Jun 6, 2023Updated 2 years ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆68Jan 27, 2026Updated 2 weeks ago
- ☆21Dec 1, 2021Updated 4 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Classes with architecture-specific information useful to other projects.☆95Feb 9, 2026Updated last week
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80May 30, 2017Updated 8 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 6 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- Web wrapper of niklasb/libc-database☆211Nov 24, 2024Updated last year
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- ☆24Mar 8, 2017Updated 8 years ago
- ☆27Jul 29, 2013Updated 12 years ago
- ☆25Jun 16, 2021Updated 4 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Nov 12, 2019Updated 6 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago