ewimberley / AdvancedMemoryChallenges
Advanced buffer overflow and memory corruption security challenges
☆189Updated 2 years ago
Related projects: ⓘ
- Example code from "Programming Linux Anti-Reversing Techniques"☆96Updated 7 years ago
- Library for creating CTF services.☆75Updated 7 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆103Updated 3 years ago
- Implementations of program analysis tools with a focus on machine code☆207Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- Slides and very basic examples☆111Updated 7 years ago
- ☆108Updated this week
- An open source, multi-architecture ROP compiler written in python☆160Updated 7 years ago
- A program to draw rectangles from heap traces.☆131Updated 4 years ago
- ☆136Updated 2 years ago
- Semantic Binary Code Analysis Framework☆123Updated 8 years ago
- ☆57Updated this week
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆161Updated this week
- Synesthesia, implemented as Yices scripts☆89Updated 7 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆163Updated 6 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 6 years ago
- ☆16Updated 6 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- capstone based disassembler for extracting to binnavi☆226Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆164Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 8 years ago
- ☆88Updated last month
- ☆26Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated last year
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 6 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆155Updated 8 years ago