Simple shellcode testing tool.
☆49Feb 24, 2012Updated 14 years ago
Alternatives and similar repositories for shtest
Users that are interested in shtest are comparing it to the libraries listed below
Sorting:
- Fix stack addresses (when no ASLR) with and without debugging☆182Jan 23, 2015Updated 11 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- Some helpful things for AVR☆16Jan 23, 2018Updated 8 years ago
- Find first derivatives of functions automagically☆10Feb 21, 2017Updated 9 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Feb 16, 2016Updated 10 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- A demangler package for gcc 3.x and gcc 4.x☆11May 2, 2018Updated 7 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆19May 23, 2019Updated 6 years ago
- Bring back Interactive Typeahead to Nautilus on Debian☆16Oct 15, 2019Updated 6 years ago
- PoC binary file of FakeID,with some source code☆46Aug 7, 2014Updated 11 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- ☆17Jun 3, 2025Updated 9 months ago
- Asynchronous exploit farm for attack-defence CTF☆22Nov 8, 2018Updated 7 years ago
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- ☆19Jan 30, 2016Updated 10 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆94Feb 17, 2020Updated 6 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Mar 22, 2015Updated 11 years ago
- EthSential is a security analysis framework for Ethereum smart contracts. It bundles other tools to find vulnerabilities in smart contrac…☆23Oct 6, 2020Updated 5 years ago
- A Binary Ninja plugin for WebAssembly.☆15Jun 30, 2020Updated 5 years ago
- Automatically format python interpreter results in hex☆30Sep 21, 2022Updated 3 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- ☆40Apr 21, 2015Updated 10 years ago
- ☆17Nov 27, 2020Updated 5 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago