leommxj / prebuilt-multiarch-bin
prebuilt binaries for multiple architeture
☆172Updated 2 years ago
Alternatives and similar repositories for prebuilt-multiarch-bin:
Users that are interested in prebuilt-multiarch-bin are comparing it to the libraries listed below
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆86Updated 7 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆84Updated 2 years ago
- ☆289Updated 2 years ago
- ☆222Updated 4 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆221Updated 4 months ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆49Updated 7 years ago
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆149Updated 2 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 5 months ago
- ☆173Updated 2 months ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆183Updated 4 years ago
- My fuzzing corpus☆267Updated 5 years ago
- windows debug and exploit toolset for both user and kernel mode☆183Updated 7 months ago
- Linux kernel privilege escalation techniques☆133Updated 8 months ago
- ☆195Updated last week
- A happy heap editor to support your exploitation process☆194Updated 3 years ago
- Script to setup pwn environment for CTF with Docker☆154Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆120Updated 7 years ago
- 🔍Heap analysis tool for CTF pwn.☆222Updated 3 years ago
- A de-socketing library for fuzzing.☆145Updated last month
- ☆173Updated 5 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆405Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆186Updated last year
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆344Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated 11 months ago
- ☆68Updated 5 months ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆602Updated 3 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆241Updated last year
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆342Updated 5 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆122Updated last year