kapaw / pwnmachineLinks
Vagrant setup for building a machine for CTF/exploit development
☆21Updated 6 years ago
Alternatives and similar repositories for pwnmachine
Users that are interested in pwnmachine are comparing it to the libraries listed below
Sorting:
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- python and honggfuzz☆26Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆17Updated 4 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- QuickPatch: A patching tool☆13Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Flare-On solutions☆37Updated 6 years ago
- A library for patching ELFs☆62Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 7 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- ¯\_(ツ)_/¯☆30Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆70Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago