Just a repo for random tools we have developed related to vulnerability research and exploit development.
☆24Nov 19, 2020Updated 5 years ago
Alternatives and similar repositories for vulndev-tools
Users that are interested in vulndev-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Coronavirus disease 2019(COVID-19) statistical data from the Chinese medical community(dxy.cn) to json format☆21Jun 14, 2020Updated 5 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- ☆10Mar 6, 2026Updated 2 weeks ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- extract various firmware blobs from iBoot☆48Oct 4, 2020Updated 5 years ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago
- Java class name obfuscation via classloader segregation and graph colouring☆18Jul 4, 2017Updated 8 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- ☆43Dec 23, 2021Updated 4 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆47Aug 18, 2022Updated 3 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- macOS Security Research☆122Mar 15, 2024Updated 2 years ago
- Tools for unpacking and repacking firmware images for the Insta360 X3☆13Sep 19, 2023Updated 2 years ago
- Antenna analyzer based on RigExpert Zero II and Arduino☆13Jan 25, 2024Updated 2 years ago
- My personal repository☆13Jan 18, 2026Updated 2 months ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- A C++ memory context☆11Jul 28, 2021Updated 4 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 5 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- Packages for IDA Pro (written in python but supports all)☆133Jan 4, 2021Updated 5 years ago
- ☆12Sep 4, 2023Updated 2 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- ☆11Nov 25, 2020Updated 5 years ago