☆81Oct 15, 2017Updated 8 years ago
Alternatives and similar repositories for Binary-exploit-writeups
Users that are interested in Binary-exploit-writeups are comparing it to the libraries listed below
Sorting:
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Udemy – Linux Heap Exploitation☆54Jun 14, 2021Updated 4 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- ☆200Jan 1, 2018Updated 8 years ago
- ☆111Dec 30, 2019Updated 6 years ago
- Linux Binary Exploitation☆1,357Jun 15, 2021Updated 4 years ago
- Firmware for a Canon DSLR IR remote loaded on an Arduino and an Atmel microcontroller☆11Jan 26, 2018Updated 8 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- cpufuzz is a dumb, simple and portable CPU fuzzer☆11Jan 27, 2019Updated 7 years ago
- ☆17May 2, 2024Updated last year
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated 3 weeks ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Notification system, that schedules alarms on redis and send to all consumers.☆13Jan 24, 2022Updated 4 years ago
- Firmware images for hacking, reverse engineering, and teardown of the Ryze / DJI / Intel Movidius Tello☆10Dec 6, 2018Updated 7 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Resources for Windows exploit development☆1,649Dec 20, 2021Updated 4 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- ESP32 Remote JTAG Host for programming FPGAs☆28Sep 28, 2020Updated 5 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Jul 22, 2023Updated 2 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 3 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- ☆10Oct 27, 2022Updated 3 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Design resources for developers is a selection of more than 400 sites to facilitate developers.☆13Dec 8, 2022Updated 3 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- TinyGo Hardware Continuous Integration (HCI) system.☆20Updated this week
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Echo Hack The Talk Materials 2019☆12Sep 12, 2019Updated 6 years ago
- ☆12May 31, 2018Updated 7 years ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago