PEDA - Python Exploit Development Assistance for GDB
☆19Nov 7, 2017Updated 8 years ago
Alternatives and similar repositories for peda
Users that are interested in peda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 11 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Dive into ELF files using simple self-contained examples☆153Aug 30, 2015Updated 10 years ago
- iOS ROP以及逃逸沙盒的简单实践☆43May 4, 2016Updated 9 years ago
- discuz-plugin-scan☆21Sep 23, 2015Updated 10 years ago
- Cortana Bot for Telegram using Telegram Bot APIs public version☆10Jul 9, 2015Updated 10 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- A single page for daily duty assignment☆12Jan 14, 2016Updated 10 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- Dalvik vm Instrumentation OS☆87May 13, 2016Updated 9 years ago
- ☆52Oct 5, 2016Updated 9 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- A tool which automates and simplifies the on-device fuzzing of MobileSafari.☆24Jan 6, 2016Updated 10 years ago
- subdomain、port、folder scanner☆25Apr 20, 2016Updated 9 years ago
- Various Jeb plugins, including obfuscation restore☆92May 18, 2016Updated 9 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- 让你的Nginx变成IIS的样子☆18Mar 19, 2014Updated 12 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- WooYun Network Scanner☆47Apr 24, 2020Updated 5 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- A Modular System for Flexible, High-Performance Traffic http://www.ict-mplane.eu/☆24Oct 4, 2018Updated 7 years ago
- Firefox extension to override HTTP hreader Content-Disposition☆12Jun 14, 2017Updated 8 years ago
- Android sandboxing (ptrace based)☆14Jul 21, 2015Updated 10 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- Android system and software research resources☆13Aug 10, 2014Updated 11 years ago
- ☆26Nov 9, 2014Updated 11 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago
- yarning about data science for white hat security researchers☆118Oct 16, 2019Updated 6 years ago
- Miscellaenous DEX (Dalvik Executable) tools☆84Dec 22, 2023Updated 2 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago