alset0326 / peda-arm
GDB plugin peda for arm
☆146Updated 3 months ago
Alternatives and similar repositories for peda-arm:
Users that are interested in peda-arm are comparing it to the libraries listed below
- ☆85Updated 8 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆206Updated 2 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- ☆56Updated 4 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆88Updated 6 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆65Updated 5 years ago
- ☆52Updated 7 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆152Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆46Updated 5 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- Packages for IDA Pro (written in python but supports all)☆131Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Various debugging tools such as %DumpObjects for v8☆54Updated 6 years ago
- Some new commands debug heap for peda☆99Updated 2 weeks ago
- GDB for pwn☆11Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- ☆55Updated 3 months ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆80Updated 6 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆120Updated 7 years ago
- The Harvest of V8 regress.☆136Updated 4 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆123Updated last year
- Yet another xinetd docker used to build pwnable challenges.☆36Updated 5 years ago
- android kernel pwn☆19Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆149Updated 5 years ago
- ☆49Updated 4 years ago