antire-book / dont_panicLinks
Linux bind shell with anti-reverse engineering techniques
☆287Updated 8 years ago
Alternatives and similar repositories for dont_panic
Users that are interested in dont_panic are comparing it to the libraries listed below
Sorting:
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆357Updated 5 years ago
- Repository to train/learn memory corruption on the ARM platform.☆354Updated 8 years ago
- Radare Congress Stuff☆210Updated 7 months ago
- random brain dumps☆347Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆355Updated 7 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 6 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- capstone based disassembler for extracting to binnavi☆228Updated 9 years ago
- add symbols back into a stripped ELF binary (~strip)☆172Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Visualization of heap operations.☆610Updated 6 months ago
- collage of reverse engineering topics that I find interesting☆5Updated last week
- Cross Architecture Shellcode in C☆201Updated 8 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Slides and very basic examples☆111Updated 8 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.