kpcyrd / defcon26-pow
Fast defcon 26 quals pow solver
☆25Updated 6 years ago
Alternatives and similar repositories for defcon26-pow
Users that are interested in defcon26-pow are comparing it to the libraries listed below
Sorting:
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- ☆36Updated 12 years ago
- Binary (In)security tool☆25Updated 11 months ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 6 months ago
- ☆26Updated 5 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- CTF Writeups☆23Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- CLI tool to analyze PE files☆88Updated 7 months ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆48Updated 3 months ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆89Updated last year
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- The Alternative Fileless File System☆57Updated 6 years ago