matrix1001 / nadbgView external linksLinks
👀Dynamic memory watcher/tracer/analyzer for CTF pwn
☆51Jul 11, 2020Updated 5 years ago
Alternatives and similar repositories for nadbg
Users that are interested in nadbg are comparing it to the libraries listed below
Sorting:
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- 💖CTF pwn framework.☆341May 3, 2022Updated 3 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 9 months ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 6 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆50Mar 26, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆359Oct 19, 2024Updated last year
- ☆19Dec 28, 2021Updated 4 years ago
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Script to setup pwn environment for CTF with Docker☆155Sep 9, 2021Updated 4 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57May 4, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- CVE-2023-40477 PoC by Wild-Pointer☆24Aug 30, 2023Updated 2 years ago
- 🍗An interactive way of pwnning.☆44Aug 1, 2019Updated 6 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- A Binary Ninja plugin for vulnerability research.☆300Sep 7, 2024Updated last year
- afl源码分析☆13Aug 9, 2018Updated 7 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- Burp extension to allow you to highlight Repeater tabs.☆10Jun 14, 2021Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- ☆15May 23, 2019Updated 6 years ago
- Match GPS traces against OpenStreetMap data to find where you haven't gone yet☆13Apr 12, 2021Updated 4 years ago
- ☆26Apr 29, 2017Updated 8 years ago