cozpii / twirpbotLinks
API for data collection in twitter. Developed as part of a bot detection project.
☆12Updated 7 years ago
Alternatives and similar repositories for twirpbot
Users that are interested in twirpbot are comparing it to the libraries listed below
Sorting:
- This repo aims at providing practical examples on how to use r2frida☆203Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184Updated 4 years ago
- Useful tips by OTA CTF members☆148Updated 6 years ago
- Some security related notes☆461Updated 8 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆202Updated 5 years ago
- Cream of the Crop Pwning Challenges☆32Updated 5 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆212Updated 3 years ago
- A collection of reverse engineering challenges for learning about the Android operating system and mobile security.☆367Updated 5 years ago
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆545Updated 2 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 5 years ago
- ☆174Updated 4 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆181Updated 10 years ago
- IDA script for highlighting and decoding ARM system instructions☆403Updated 4 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Updated 3 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Updated 4 years ago
- BootStomp: a bootloader vulnerability finder☆408Updated 3 years ago
- Linux Heap Exploitation Practice☆392Updated 6 years ago
- An Android CTF practice challenge☆114Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆576Updated 5 years ago
- Python module for demangling rust function names☆20Updated 4 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆682Updated 6 years ago
- Slide decks from my conference presentations☆366Updated 2 years ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆947Updated 3 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆280Updated 5 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆317Updated 2 years ago
- Simplify format string exploitation.☆345Updated 4 years ago
- Repository with the material of the Tower of Hanoi introductory briefings on binary exploitation☆23Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆357Updated 8 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- Writeups for Pico CTF 2017 capture the flag hacking compeition☆14Updated 7 years ago