corkami / pocsLinks
Proof of Concepts (PE, PDF...)
☆1,500Updated 5 months ago
Alternatives and similar repositories for pocs
Users that are interested in pocs are comparing it to the libraries listed below
Sorting:
- documentations, slides decks...☆797Updated last year
- A Coverage Explorer for Reverse Engineers☆2,364Updated 10 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,942Updated 2 weeks ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,968Updated 3 months ago
- A work-in-progress deobfuscator for movfuscated binaries☆729Updated 3 weeks ago
- Psychological warfare in reverse engineering☆1,002Updated 5 years ago
- A fork of AFL for fuzzing Windows binaries☆2,429Updated 2 months ago
- Some helpful preload libraries for pwning stuff.☆1,613Updated last week
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,800Updated 3 months ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆3,875Updated 6 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,665Updated last year
- ☆969Updated last month
- A collection of pwn/CTF related utilities for Ghidra☆680Updated 8 months ago
- Automated static analysis tools for binary programs☆1,602Updated 2 weeks ago
- DOM fuzzer☆1,734Updated 6 months ago
- A fast, parallel test case minimization tool.☆959Updated 4 years ago
- Export disassemblies into Protocol Buffers☆1,107Updated last month
- Scripts for the Ghidra software reverse engineering suite.☆1,079Updated 4 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,662Updated 3 months ago
- VirtualBox E1000 Guest-to-Host Escape☆1,410Updated 6 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆723Updated 5 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- An archive of low-level CTF challenges developed over the years☆633Updated 3 years ago
- Powerful Disassembler Library For x86/AMD64☆1,293Updated last year
- a general-purpose fuzzer☆1,278Updated 6 years ago
- A collection of links related to VMware escape exploits☆1,426Updated 8 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,545Updated this week
- A Pwn2Own exploit chain☆761Updated 6 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,129Updated last year