epinna / codepathsLinks
Binary reversing tool to find all possible code paths between two functions.
☆27Updated 7 years ago
Alternatives and similar repositories for codepaths
Users that are interested in codepaths are comparing it to the libraries listed below
Sorting:
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- A shellcode testing harness.☆69Updated last year
- CTF exploit development and other tools of pwnage☆21Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆65Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- A medley of PoCs and exploits☆1Updated 6 years ago
- ☆21Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- ☆36Updated 5 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago