decompetition / challenges-2021Links
☆22Updated 3 years ago
Alternatives and similar repositories for challenges-2021
Users that are interested in challenges-2021 are comparing it to the libraries listed below
Sorting:
- Symbolic execution engine for Whitespace.☆14Updated 4 years ago
- ☆16Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90Updated 3 years ago
- ☆40Updated 2 months ago
- ☆34Updated 3 years ago
- a new class of file structure attacks☆55Updated 2 years ago
- Docker image for RISC-V 32/64 development environment, along with Qemu☆26Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆92Updated last month
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Updated 3 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Updated 3 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆68Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- AFL bindings for Unicorn-Engine☆87Updated last month
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- ☆38Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆18Updated last year
- qemu vulnerablity.☆54Updated 4 years ago
- IDA script for parsing kallsyms☆83Updated 4 months ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆115Updated 11 months ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 3 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆36Updated 2 months ago
- ☆46Updated 3 years ago
- ☆20Updated 2 years ago
- Run IDA scripts headlessly.☆208Updated last month
- ☆72Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆58Updated 3 years ago
- My-CTF-Challenges☆15Updated 4 years ago
- ☆13Updated 3 years ago