kpcyrd / defcon26-pow
Fast defcon 26 quals pow solver
☆25Updated 6 years ago
Alternatives and similar repositories for defcon26-pow:
Users that are interested in defcon26-pow are comparing it to the libraries listed below
- Binary (In)security tool☆23Updated 7 months ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Exploitation challenges for CTF☆62Updated 6 years ago
- ☆26Updated 4 years ago
- ☆36Updated 5 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 3 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Updated 7 years ago
- ☆35Updated 12 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- pure Python binary analysis framework☆22Updated 6 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 2 months ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆35Updated 6 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- ☆22Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆36Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Small Rust programs that do weird things☆27Updated 2 years ago
- Red Team Resources☆59Updated 6 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago