examples of using radius2 to solve reversing challenges
☆36Jan 3, 2025Updated last year
Alternatives and similar repositories for radius2-examples
Users that are interested in radius2-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆28May 7, 2025Updated 11 months ago
- SIPP(Statistically sound Inner Pairing Product) verification in SNARK☆17Oct 8, 2023Updated 2 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆628Dec 20, 2024Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 4 years ago
- Proof of Concept for the "Zero Knowledge State Channel", a novel construction for increasing scalability while also enforcing privacy pre…☆13Apr 2, 2023Updated 3 years ago
- ☆31Aug 13, 2025Updated 8 months ago
- Tstore huff template☆17Oct 6, 2023Updated 2 years ago
- The Noir library for the Fraction data type, maintained by Resurgence Labs.☆11Jul 30, 2024Updated last year
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 10 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆141Oct 20, 2025Updated 6 months ago
- List of some AD tools I frequently use☆58Nov 2, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Webb Protocol Implementation in CosmWasm.☆24Sep 1, 2022Updated 3 years ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆37Apr 2, 2026Updated last month
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆31Jan 20, 2026Updated 3 months ago
- An Ansible role that runs Vulhub environments on a Linux system.☆21Oct 15, 2025Updated 6 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- ☆91Apr 26, 2026Updated last week
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Dec 2, 2025Updated 5 months ago
- a new class of file structure attacks☆60Nov 19, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Proof-of-concept for I See Dead Micro-Ops transient execution attack☆14Nov 3, 2021Updated 4 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆23Sep 29, 2025Updated 7 months ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆26Jun 24, 2023Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 31, 2026Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago