legitbs / cLEMENCyLinks
cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017
☆125Updated 8 years ago
Alternatives and similar repositories for cLEMENCy
Users that are interested in cLEMENCy are comparing it to the libraries listed below
Sorting:
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- ☆81Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- IDA cLEMENCy Tools☆63Updated 8 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆142Updated 7 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- ELF Unstrip Tool☆107Updated 10 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- A collection of more than 1000 binary libc files☆90Updated 10 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Scripts for Binary Ninja☆258Updated 2 years ago
- grap: define and match graph patterns within binaries☆172Updated 4 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆262Updated 3 months ago
- ☆77Updated 10 years ago
- CTF Challenge Framework for Windows 8 and above☆157Updated 4 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆188Updated 4 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 5 months ago
- ☆105Updated 10 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- GATEKEEPER: Inline and on-target defense☆121Updated 3 years ago
- A x86 systematic ROP payload generation☆57Updated 5 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 10 years ago