examples of using radius2 to solve reversing challenges
☆36Jan 3, 2025Updated last year
Alternatives and similar repositories for radius2-examples
Users that are interested in radius2-examples are comparing it to the libraries listed below
Sorting:
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- The Noir library for the Fraction data type, maintained by Resurgence Labs.☆11Jul 30, 2024Updated last year
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆621Dec 20, 2024Updated last year
- Proof of Concept for the "Zero Knowledge State Channel", a novel construction for increasing scalability while also enforcing privacy pre…☆13Apr 2, 2023Updated 2 years ago
- ☆31Aug 13, 2025Updated 6 months ago
- SIPP(Statistically sound Inner Pairing Product) verification in SNARK☆17Oct 8, 2023Updated 2 years ago
- ☆48Oct 15, 2025Updated 4 months ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆30Jan 20, 2026Updated last month
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- An Ansible role that runs Vulhub environments on a Linux system.☆20Oct 15, 2025Updated 4 months ago
- Learn how to intercept flutter apps☆23Jan 19, 2024Updated 2 years ago
- Tstore huff template☆17Oct 6, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Webb Protocol Implementation in CosmWasm.☆24Sep 1, 2022Updated 3 years ago
- RLN on KZG☆21Sep 20, 2023Updated 2 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 8 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆97Oct 20, 2025Updated 4 months ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆103Jan 14, 2024Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆23Nov 6, 2023Updated 2 years ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Apr 24, 2025Updated 10 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆62Oct 28, 2025Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- Polynomial Expression Engine☆35Feb 13, 2024Updated 2 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- ☆29May 22, 2024Updated last year