☆280May 21, 2020Updated 5 years ago
Alternatives and similar repositories for EpicTreasure
Users that are interested in EpicTreasure are comparing it to the libraries listed below
Sorting:
- ☆72Nov 27, 2018Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Binary Ninja plugin for Voltron integration☆164Jun 22, 2018Updated 7 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆166Jun 26, 2018Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,001Aug 27, 2022Updated 3 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆411Jul 8, 2022Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- RHme+ 2015 challenge☆115Jun 7, 2016Updated 9 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- random brain dumps☆350Jul 17, 2017Updated 8 years ago
- Library for creating CTF services.☆75Nov 11, 2016Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆298Nov 23, 2017Updated 8 years ago
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- ☆92Aug 18, 2024Updated last year
- Visualization of heap operations.☆616Dec 5, 2024Updated last year
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- Codemap☆127Jan 13, 2017Updated 9 years ago
- CTF write-ups by Plaid Parliament of Pwning☆805Jun 4, 2024Updated last year
- ☆81Jun 12, 2017Updated 8 years ago
- Yet another CTF platform☆148Nov 29, 2017Updated 8 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- Scripts for Binary Ninja☆258Apr 11, 2023Updated 2 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- A colleciton of CTF write-ups all using pwntools☆518Oct 5, 2016Updated 9 years ago
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated 2 weeks ago
- Some setup scripts for security research tools.☆9,323Mar 1, 2026Updated 3 weeks ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago