kapaw / pwnmachineLinks
Vagrant setup for building a machine for CTF/exploit development
☆21Updated 6 years ago
Alternatives and similar repositories for pwnmachine
Users that are interested in pwnmachine are comparing it to the libraries listed below
Sorting:
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- python and honggfuzz☆26Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆71Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- ☆17Updated 4 years ago
- ☆86Updated 2 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Flare-On solutions☆37Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- A library for patching ELFs☆61Updated 5 years ago
- tool for multi-execution jump coverage introspection☆68Updated 11 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- #INFILTRATE20 raptor's party pack.☆30Updated 2 months ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- A function tracer☆92Updated 6 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago