ewimberley / AdvancedMemoryChallengesLinks
Advanced buffer overflow and memory corruption security challenges
☆189Updated 3 years ago
Alternatives and similar repositories for AdvancedMemoryChallenges
Users that are interested in AdvancedMemoryChallenges are comparing it to the libraries listed below
Sorting:
- ☆138Updated 3 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆99Updated 8 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆102Updated 4 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated 2 months ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- Slides and very basic examples☆112Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆152Updated last year
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- ☆89Updated 10 months ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ☆49Updated 7 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- A Python tool to generate ROP chains☆64Updated 5 months ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago
- Radare Congress Stuff☆212Updated 8 months ago
- Implementations of program analysis tools with a focus on machine code☆210Updated 10 years ago
- Fuzzing results for various interpreters.☆81Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago