GDB scripts to add support for low level debugging and reverse engineering
☆148Apr 30, 2016Updated 9 years ago
Alternatives and similar repositories for dotgdb
Users that are interested in dotgdb are comparing it to the libraries listed below
Sorting:
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Analyzer and simulator of logic circuit☆15May 8, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Get symbol address and name from tables for kallsyms☆33Apr 4, 2016Updated 9 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- Fuzzing things with afl and python-afl☆59Jul 14, 2016Updated 9 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- Dive into ELF files using simple self-contained examples☆153Aug 30, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- ☆22Dec 23, 2015Updated 10 years ago
- Composable high-level instrumentation for C libraries' malloc and friends☆18Nov 15, 2025Updated 3 months ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago