luong-komorebi / Attack-LabLinks
CMU's attack lab
☆13Updated last year
Alternatives and similar repositories for Attack-Lab
Users that are interested in Attack-Lab are comparing it to the libraries listed below
Sorting:
- Experiments on C/C++ Exploits☆22Updated 4 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- ☆11Updated 4 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆22Updated 6 years ago
- Tiny research project to understand code injections on Linux based systems☆13Updated 7 years ago
- ☆13Updated 6 years ago
- IDAPython plugin to integrate Visual Studio Help Viewer in IDA Pro >= 6.8☆12Updated 8 years ago
- Plugins for IDA Pro and Hex-Rays☆41Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Updated 8 years ago
- ☆12Updated 7 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- ☆14Updated 2 years ago
- Ghidra consonance and make it more ida-ish☆16Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆18Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆21Updated 6 years ago
- bunch of random stuff☆21Updated 5 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 6 years ago
- quals-2014☆22Updated 10 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- ☆32Updated 11 months ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆37Updated 12 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago