Helper script for working with format string bugs
☆57May 2, 2020Updated 5 years ago
Alternatives and similar repositories for formatStringExploiter
Users that are interested in formatStringExploiter are comparing it to the libraries listed below
Sorting:
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- DNS Spoof☆31Jun 23, 2020Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆94Jul 26, 2017Updated 8 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago