ewimberley / AdvancedMemoryChallengesLinks
Advanced buffer overflow and memory corruption security challenges
☆190Updated 3 years ago
Alternatives and similar repositories for AdvancedMemoryChallenges
Users that are interested in AdvancedMemoryChallenges are comparing it to the libraries listed below
Sorting:
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated 2 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆103Updated 4 years ago
- Semantic Binary Code Analysis Framework☆124Updated 10 years ago
- Radare Congress Stuff☆215Updated 2 months ago
- ☆137Updated 4 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Slides and very basic examples☆112Updated 8 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆165Updated 7 years ago
- ☆49Updated 7 years ago
- ☆26Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- A Python tool to generate ROP chains☆64Updated 10 months ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- ☆137Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- ☆91Updated last year
- GATEKEEPER: Inline and on-target defense☆121Updated 3 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago