ilovepp / ppc_rebaseLinks
☆17Updated 10 years ago
Alternatives and similar repositories for ppc_rebase
Users that are interested in ppc_rebase are comparing it to the libraries listed below
Sorting:
- linux system call hook framework☆47Updated 7 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆54Updated 7 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- 基于angr的污点分析引擎☆41Updated 6 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆54Updated 8 years ago
- CTF challenge and Writeup☆13Updated 6 years ago
- hack vm☆12Updated 6 years ago
- ☆31Updated 5 years ago
- ☆17Updated 5 years ago
- records of my daily sec learning☆13Updated 5 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 8 years ago
- Merge multi binaries into one IDA database.☆24Updated 4 years ago
- some ida script☆34Updated 4 years ago
- Tool that converts All of libc to signatures for IDA Pro FLIRT Plugin. and utility make sig with FLAIR easily☆172Updated 3 years ago
- ☆40Updated last week
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆90Updated 8 years ago
- qemu vulnerablity.☆55Updated 4 years ago
- 搜集的一些kernel paper☆25Updated 5 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆34Updated 6 years ago
- ☆31Updated 3 years ago
- ☆103Updated 4 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆36Updated 6 years ago
- ☆55Updated 3 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆14Updated 11 months ago
- A plugin to resolve .plt.sec symbols in IDA☆79Updated 5 years ago
- angr源码分析☆33Updated 6 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆48Updated 3 years ago
- QEMU escape code☆63Updated 4 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 7 years ago