kapaw / pwnmachine
Vagrant setup for building a machine for CTF/exploit development
☆23Updated 5 years ago
Alternatives and similar repositories for pwnmachine:
Users that are interested in pwnmachine are comparing it to the libraries listed below
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Ditto.☆17Updated 4 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- The Dumb Network Fuzzer☆19Updated last year
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- POC for cve-2019-1458