Modified from pwndbg. Enhance the UI part for better usage.
☆26Jun 14, 2019Updated 6 years ago
Alternatives and similar repositories for 217gdb
Users that are interested in 217gdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 14, 2017Updated 8 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- code emulator base on unicorn engine☆51Apr 23, 2018Updated 7 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- about yacc, lex, LL(1), LR, first set, follow set, predict set ...☆20Jun 6, 2016Updated 9 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- ELF Unstrip Tool☆107Aug 19, 2015Updated 10 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- LASACTF Problem Source☆13Aug 12, 2016Updated 9 years ago
- HITCON Badge Related Files.☆58Jul 24, 2018Updated 7 years ago
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- ELF parser library implemented in pure Ruby!☆46Nov 1, 2025Updated 4 months ago
- Instruction cache leakage detection tool for modular exponentation software.☆15Mar 17, 2017Updated 9 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- ☆17May 29, 2018Updated 7 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 8 years ago
- ☆11May 19, 2017Updated 8 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆64Oct 31, 2020Updated 5 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- A fuzzing library in JavaScript. ✨☆117Feb 3, 2026Updated last month
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- BPF Processor for IDA Python☆53Aug 27, 2018Updated 7 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- ☆68Apr 27, 2020Updated 5 years ago