jakespringer / angr_ctf
☆973Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for angr_ctf
- Documentation for the angr suite☆839Updated last year
- Provide powerful tools for seccomp analysis☆987Updated 2 weeks ago
- The official angr GUI.☆907Updated this week
- IDA FLIRT Signature Database☆840Updated 2 years ago
- ☆610Updated last month
- gdb for pwn☆893Updated 3 months ago
- Build a database of libc offsets to simplify exploitation☆1,716Updated 3 weeks ago
- A docker environment for pwn in ctf☆739Updated last year
- The best tool for finding one gadget RCE in libc.so.6☆2,073Updated 2 weeks ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆739Updated 2 years ago
- Some pwn challenges selected for training and education.☆379Updated last year
- kernel-pwn and writeup collection☆568Updated last year
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,499Updated 2 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,868Updated 3 weeks ago
- Driller: augmenting AFL with symbolic execution!☆904Updated 2 years ago
- For Linux binary Exploitation☆818Updated 6 years ago
- cwe_checker finds vulnerable patterns in binary executables☆1,130Updated 3 months ago
- pwninit - automate starting binary exploit challenges☆884Updated 3 months ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆639Updated last week
- Use angr in Ghidra☆562Updated 3 months ago
- Make your IDA Lazy!☆1,094Updated last week
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,738Updated 5 years ago
- Using Intel's PIN tool to solve CTF problems☆491Updated 4 years ago
- 💖CTF pwn framework.☆341Updated 2 years ago
- A Coverage Explorer for Reverse Engineers☆2,258Updated 4 months ago
- A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda☆598Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆391Updated this week
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,115Updated last year
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,691Updated last month
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,227Updated 2 years ago