eLoopWoo / zenysec-exploit-exercisesLinks
Exploit Exercises for Security Researchers (arm, x86...)
☆13Updated 6 years ago
Alternatives and similar repositories for zenysec-exploit-exercises
Users that are interested in zenysec-exploit-exercises are comparing it to the libraries listed below
Sorting:
- kernel pool windbg extension☆84Updated 10 years ago
- IDA Pro plugin to show functions in a tree view☆114Updated 4 years ago
- dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>☆68Updated 8 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- ☆72Updated 4 years ago
- ☆89Updated 6 years ago
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆74Updated 4 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 9 months ago
- ☆91Updated 6 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆205Updated last year
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated 2 years ago
- ☆63Updated 8 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆73Updated last year
- scripts/plugins for IDA Pro☆175Updated 9 months ago
- Static unpacker for FinSpy VM☆103Updated 4 years ago
- ☆27Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Hexrays decompiler plugin that colorizes and filters the decompiler's output based on regular expressions☆139Updated last year
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- Toolkit for Hyper-V security research☆156Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Experimental opaque predicate detection for IDA Pro☆82Updated 7 years ago
- haze binary fuzzer☆55Updated last year
- exploit development☆49Updated 7 years ago