ewimberley / AdvancedMemoryChallengesLinks
Advanced buffer overflow and memory corruption security challenges
☆188Updated 3 years ago
Alternatives and similar repositories for AdvancedMemoryChallenges
Users that are interested in AdvancedMemoryChallenges are comparing it to the libraries listed below
Sorting:
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Slides and very basic examples☆111Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Some kernel exploits☆144Updated 7 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆152Updated last year
- Helper script for working with format string bugs☆57Updated 5 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆37Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- ☆138Updated 3 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆102Updated 4 years ago
- Radare 2 wiki☆93Updated 5 years ago
- capstone based disassembler for extracting to binnavi☆228Updated 9 years ago
- ☆164Updated 8 years ago
- Implementations of program analysis tools with a focus on machine code☆210Updated 10 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 7 years ago