gast04 / CTF_ToolBoxLinks
collection of used Tools for CTFs
☆15Updated 3 years ago
Alternatives and similar repositories for CTF_ToolBox
Users that are interested in CTF_ToolBox are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- ☆17Updated 4 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- ☆39Updated 4 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- My conference presentations and publications☆26Updated 3 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Binary matching with Binary Ninja☆21Updated last year
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- ☆22Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Updated 6 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- ☆27Updated 6 years ago
- ☆33Updated 8 years ago
- Export disassemblies into Protocol Buffers☆21Updated 2 weeks ago