☆21Nov 3, 2018Updated 7 years ago
Alternatives and similar repositories for writeup
Users that are interested in writeup are comparing it to the libraries listed below
Sorting:
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- A tool for analyzing code coverage and path coverage without using xdebug.☆23Sep 13, 2012Updated 13 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Scan for LLTD-enabled hosts on your network☆24Mar 8, 2021Updated 4 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- WebShell Collect☆14Dec 7, 2015Updated 10 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Official challenge and writeup repository for RITSEC CTF 2018.☆16Nov 30, 2018Updated 7 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- CTF writeups☆18Oct 19, 2023Updated 2 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆17Dec 29, 2015Updated 10 years ago
- ☆18Oct 21, 2016Updated 9 years ago
- A simple system for hosting competitive programming contests.☆23Nov 20, 2025Updated 3 months ago