gast04 / CTF_ToolBoxLinks
collection of used Tools for CTFs
☆15Updated 3 years ago
Alternatives and similar repositories for CTF_ToolBox
Users that are interested in CTF_ToolBox are comparing it to the libraries listed below
Sorting:
- ☆17Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- ☆14Updated 7 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- ☆39Updated 4 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 6 years ago
- exploit development☆49Updated 7 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 8 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- Collection of pin tools☆52Updated 9 years ago
- Yet another IDA Pro real time syncing plugin☆16Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Updated 7 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- ☆26Updated 9 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- just an experiment☆22Updated 7 years ago