decompetition / challenges-2020Links
☆48Updated 3 years ago
Alternatives and similar repositories for challenges-2020
Users that are interested in challenges-2020 are comparing it to the libraries listed below
Sorting:
- ☆17Updated 4 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 3 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 5 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- ☆154Updated 6 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 4 months ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago
- Target-centric program analysis.☆75Updated last week
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆41Updated 2 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆84Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- ☆26Updated 3 years ago
- This repository contains the currently implemented angr concrete targets.☆34Updated last year
- ☆70Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 2 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆62Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆188Updated last year
- Flex 'em lexers☆40Updated 4 years ago
- Practical P-Code examples☆58Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- Automatically format python interpreter results in hex☆25Updated 2 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- ☆65Updated 2 years ago