legitbs / cLEMENCyLinks
cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017
☆124Updated 8 years ago
Alternatives and similar repositories for cLEMENCy
Users that are interested in cLEMENCy are comparing it to the libraries listed below
Sorting:
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- SymGDB - symbolic execution plugin for gdb☆217Updated 7 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- GlibC Malloc for Exploiters presentation☆150Updated 6 years ago
- Scripts for Binary Ninja☆257Updated 2 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- IDA cLEMENCy Tools☆63Updated 8 years ago
- ELF Unstrip Tool☆107Updated 10 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆262Updated last month
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆142Updated 6 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- ☆81Updated 8 years ago
- ☆77Updated 10 years ago
- CTF Challenge Framework for Windows 8 and above☆155Updated 4 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 2 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- A collection of more than 1000 binary libc files☆89Updated 10 years ago
- ☆159Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287Updated 9 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- ☆164Updated 8 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 9 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆242Updated 6 years ago
- ☆237Updated 7 years ago
- ☆105Updated 10 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago