fareedfauzi / Flare-On-Challenges
This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.
☆309Updated 2 years ago
Alternatives and similar repositories for Flare-On-Challenges:
Users that are interested in Flare-On-Challenges are comparing it to the libraries listed below
- Windows Pwnable Study☆337Updated 4 years ago
- ☆161Updated 2 years ago
- Research notes☆121Updated 3 months ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆616Updated last week
- ☆186Updated 7 years ago
- Write-ups for various CTF☆186Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆667Updated 6 months ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 9 months ago
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆730Updated 10 months ago
- kernel-pwn and writeup collection☆600Updated last year
- Use angr in Ghidra☆575Updated 7 months ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative☆495Updated 5 months ago
- HashDB API hash lookup plugin for IDA Pro☆310Updated 5 months ago
- knowledge is power☆212Updated 11 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆51Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆443Updated this week
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆392Updated 2 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆613Updated last month
- Code snips and notes☆135Updated 3 years ago
- ☆87Updated 10 months ago
- A Binary Genetic Traits Lexer Framework☆487Updated last month
- Quickly debug shellcode extracted during malware analysis☆594Updated last year
- Kernel development & exploitation practice environment.☆223Updated last year
- ASLR bypass without infoleak☆159Updated 3 years ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆425Updated 10 months ago
- pwninit - automate starting binary exploit challenges☆922Updated 7 months ago
- Assortment of hashing algorithms used in malware☆350Updated 3 weeks ago
- ☆315Updated 9 months ago
- A Binary Ninja plugin for vulnerability research.☆289Updated 6 months ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆421Updated last year