clubby789 / pwntoolsLinks
☆19Updated 3 years ago
Alternatives and similar repositories for pwntools
Users that are interested in pwntools are comparing it to the libraries listed below
Sorting:
- ☆17Updated 3 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 7 months ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆91Updated last week
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- ☆22Updated last week
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆85Updated last week
- ☆80Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated 2 weeks ago
- A tool for automating setup of kernel pwn challenges☆60Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 10 months ago
- Radamsa fuzzer ported to rust lang☆156Updated 8 months ago
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆120Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- ☆81Updated 6 months ago
- ☆52Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated last month
- ☆80Updated last year
- ☆12Updated 4 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- ☆37Updated 11 months ago
- ☆45Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 3 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 10 months ago
- Binja (sort of) headless☆55Updated 10 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- archive of the released challenges from corCTF 2021☆25Updated 4 years ago
- ☆130Updated last year