blasty / moneyshot
hax 'n shit
☆118Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for moneyshot
- The Zulu fuzzer☆125Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Helper script for working with format string bugs☆56Updated 4 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 6 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆53Updated 8 years ago
- PoC for CVE-2015-6086☆67Updated 8 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆77Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 5 years ago
- ☆33Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 5 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 7 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- exploit development☆49Updated 6 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 9 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- Exploit collection for NT privilege escalation☆65Updated 8 years ago