arisada / dualec_pocLinks
This program exhibits the backdoor behaviour of PRNG Dual_Ec_Drbg
☆52Updated 11 years ago
Alternatives and similar repositories for dualec_poc
Users that are interested in dualec_poc are comparing it to the libraries listed below
Sorting:
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- ☆35Updated 13 years ago
- Tool to view heap chunks and memory writes (using pintool)☆41Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- ☆26Updated 7 years ago
- Some RSA attacks with sage☆11Updated 8 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Copy of the contents at phrack.com☆40Updated 6 months ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- REIL translation library☆36Updated 9 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆60Updated 10 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- CTF exploit development and other tools of pwnage☆19Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- All challenges I created for CTF☆12Updated 4 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago