lgeek / ioli_crackme_dbm_solution
Solving IOLI-crackme with Dynamic Binary Modification
☆28Updated 10 years ago
Alternatives and similar repositories for ioli_crackme_dbm_solution:
Users that are interested in ioli_crackme_dbm_solution are comparing it to the libraries listed below
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Updated 15 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- ☆13Updated 9 years ago
- ☆36Updated 12 years ago
- Malware analysis tool☆22Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Wireshark Post-Descriptors written in LUA☆12Updated 5 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- ☆38Updated 9 years ago
- ☆38Updated 12 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- See here:☆42Updated 12 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆44Updated 15 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago