☆280May 21, 2020Updated 5 years ago
Alternatives and similar repositories for EpicTreasure
Users that are interested in EpicTreasure are comparing it to the libraries listed below
Sorting:
- ☆72Nov 27, 2018Updated 7 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Binary Ninja plugin for Voltron integration☆164Jun 22, 2018Updated 7 years ago
- ☆92Aug 18, 2024Updated last year
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- RHme+ 2015 challenge☆115Jun 7, 2016Updated 9 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆297Nov 23, 2017Updated 8 years ago
- random brain dumps☆351Jul 17, 2017Updated 8 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆166Jun 26, 2018Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 9 years ago
- Codemap☆127Jan 13, 2017Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆410Jul 8, 2022Updated 3 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- Library for creating CTF services.☆75Nov 11, 2016Updated 9 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- Scripts for Binary Ninja☆258Apr 11, 2023Updated 2 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- ☆159Feb 23, 2015Updated 11 years ago
- Some helpful preload libraries for pwning stuff.☆1,646May 22, 2025Updated 9 months ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- A colleciton of CTF write-ups all using pwntools☆519Oct 5, 2016Updated 9 years ago
- Some setup scripts for security research tools.☆9,299Feb 22, 2026Updated last week
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago