blue9057 / cyber-attacks-and-defenseLinks
☆19Updated last year
Alternatives and similar repositories for cyber-attacks-and-defense
Users that are interested in cyber-attacks-and-defense are comparing it to the libraries listed below
Sorting:
- A Python library to debug binary executables, your own way.☆261Updated last week
- Automatic tool to quickly start a pwn CTF challenge☆45Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆535Updated this week
- Use angr in Ghidra☆608Updated last year
- VirtuAlization GDb integrations in pwntools☆35Updated last month
- ☆715Updated last week
- Python snippets for Ghidra's Program and Decompiler APIs☆836Updated 2 years ago
- ☆108Updated last year
- A reversing plugin for cross-decompiler collaboration, built on git.☆660Updated this week
- kernel-pwn and writeup collection☆652Updated last year
- ☆12Updated last month
- A collection of pwn/CTF related utilities for Ghidra☆690Updated last year
- ☆1,050Updated last year
- Write-ups for various CTF☆198Updated 3 weeks ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆699Updated 5 months ago
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆753Updated last year
- ropr with some tweaks for better linux kernel support☆29Updated 5 months ago
- My notes on pwn☆289Updated 3 weeks ago
- Windows Pwnable Study☆376Updated 3 months ago
- knowledge is power☆227Updated last month
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆226Updated last year
- pwninit - automate starting binary exploit challenges☆990Updated last year
- A bunch of V8 resources (with a security focus)☆56Updated this week
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆348Updated 6 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆616Updated 9 months ago
- Network analysis tool for Attack Defence CTF☆370Updated 2 months ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆84Updated last week
- FSOP Again☆25Updated 3 years ago
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆215Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆679Updated last month