azeria-labs / rotator
Small script to determine valid immediate values for ARM assembly
☆19Updated 5 years ago
Alternatives and similar repositories for rotator:
Users that are interested in rotator are comparing it to the libraries listed below
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 8 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago
- ☆49Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- Heap analysis tooling for dlmalloc☆30Updated 2 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ☆55Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- ☆20Updated 7 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Triton based R2 plugin for concolic execution and total control☆31Updated 6 years ago
- ☆36Updated 12 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- Instrumented MIPS kernel☆13Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago