gray-panda / grayrepoLinks
Personal repository for all ctf related stuffs
☆67Updated last year
Alternatives and similar repositories for grayrepo
Users that are interested in grayrepo are comparing it to the libraries listed below
Sorting:
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- ☆21Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆159Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Source for some problems from PlaidCTF 2014.☆59Updated 11 years ago
- A Python tool to generate ROP chains☆65Updated last year
- The Zulu fuzzer☆124Updated 8 years ago
- ☆91Updated 6 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆52Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Updated last year
- ☆34Updated 9 years ago
- ☆49Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Exploits for interesting CTF challenges I have worked on☆63Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago