eleemosynator / writeups
Write-ups for crackmes and CTF challenges
☆51Updated 2 years ago
Alternatives and similar repositories for writeups:
Users that are interested in writeups are comparing it to the libraries listed below
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆72Updated 3 years ago
- A library for patching ELFs☆53Updated 4 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆102Updated 6 months ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆66Updated 3 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- ☆152Updated 6 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆51Updated 2 months ago
- ☆47Updated 2 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- Flare-On solutions☆36Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- ☆134Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated last month
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Yet another rule generator for Yara☆28Updated 4 years ago
- Malware dynamic instrumentation tool based on frida framework☆104Updated 4 years ago
- Simple library to spray the Windows Kernel Pool☆107Updated 5 years ago