πDynamic memory watcher/tracer/analyzer for CTF pwn
β52Jul 11, 2020Updated 5 years ago
Alternatives and similar repositories for nadbg
Users that are interested in nadbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- πHeap analysis tool for CTF pwn.β224May 4, 2021Updated 4 years ago
- πCTF pwn framework.β341May 3, 2022Updated 3 years ago
- Cross-architecture instruction counting for CTF solvingβ48Mar 13, 2022Updated 4 years ago
- Runtime Runtime-Oriented Programming (ROP) protectionβ11Feb 17, 2019Updated 7 years ago
- Automatic vulnerability detection and exploit generationβ16Jul 24, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CTF&RealWorld challengesβ26Oct 18, 2019Updated 6 years ago
- β16Jan 23, 2022Updated 4 years ago
- πAn interactive way of pwnning.β44Aug 1, 2019Updated 6 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025β23Apr 18, 2025Updated 11 months ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.β16Jan 9, 2022Updated 4 years ago
- Improving side channel analysis techniques for CTF problems.β12Oct 25, 2020Updated 5 years ago
- An interactive memory info for pwning / exploitingβ98Apr 13, 2023Updated 2 years ago
- GDB for pwnβ11Sep 10, 2025Updated 6 months ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.β225Sep 16, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- β227Dec 9, 2020Updated 5 years ago
- β26Apr 29, 2017Updated 8 years ago
- IFL - Interactive Functions List (plugin for Binary Ninja)β25Jul 9, 2024Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packetsβ35Sep 23, 2022Updated 3 years ago
- aflζΊη εζβ13Aug 9, 2018Updated 7 years ago
- WTF are those magic numbers?!!β33Dec 20, 2021Updated 4 years ago
- Script to setup pwn environment for CTF with Dockerβ154Sep 9, 2021Updated 4 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.β18Sep 26, 2022Updated 3 years ago
- Backwards program slice stitching for automatic CTF problem solving.β50Mar 26, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- r2con 2020 CTF kernel challengeβ12Sep 13, 2020Updated 5 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilitiesβ350Sep 25, 2023Updated 2 years ago
- Bucket and triage on-disk crashes. OSX and Linux.β360Oct 19, 2024Updated last year
- Frida plugin for Binary Ninjaβ20Jan 12, 2025Updated last year
- Match GPS traces against OpenStreetMap data to find where you haven't gone yetβ13Apr 12, 2021Updated 4 years ago
- Binary Ninja plugin for annotation of arguments for functionsβ22Oct 20, 2024Updated last year
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'β103Nov 24, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solvedβ25Jul 20, 2021Updated 4 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1γFuzzingβ57May 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- β19Dec 28, 2021Updated 4 years ago
- β11Nov 19, 2017Updated 8 years ago
- official source code of *CTF2019β225May 7, 2019Updated 6 years ago
- linux kernel LPE using hw_breakpoint attack tech demoβ26Mar 24, 2023Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.β204Jul 22, 2020Updated 5 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitivesβ158Mar 3, 2021Updated 5 years ago
- WCTF 2019 challengeβ103Jul 9, 2019Updated 6 years ago