carstein / BinjaPosters
Binary Ninja Posters
☆35Updated 4 years ago
Alternatives and similar repositories for BinjaPosters:
Users that are interested in BinjaPosters are comparing it to the libraries listed below
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- ☆33Updated 9 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- Automatic Vulnerability Discovery☆37Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- An extendable, tabbed, dockable UI widget plugin for BinaryNinja https://binary.ninja.☆37Updated 8 years ago
- ☆39Updated 4 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆138Updated 3 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- ☆51Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆63Updated 5 years ago
- A Python tool to generate ROP chains☆60Updated 2 months ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆91Updated 5 years ago
- QL Workshop☆16Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆99Updated 2 years ago
- ☆15Updated 5 years ago
- ☆45Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Challenge for the 33C3 CTF☆15Updated 8 years ago
- Personal repository for all ctf related stuffs☆67Updated 4 months ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago