A collection of more than 1000 binary libc files
☆90Mar 26, 2015Updated 10 years ago
Alternatives and similar repositories for libc-binary-collection
Users that are interested in libc-binary-collection are comparing it to the libraries listed below
Sorting:
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- GATEKEEPER: Inline and on-target defense☆122Sep 1, 2022Updated 3 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Dive into ELF files using simple self-contained examples☆153Aug 30, 2015Updated 10 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- A Return-oriented Programming toolkit☆352May 14, 2017Updated 8 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- Better CodeEditor for Ida Pro.☆229Dec 25, 2020Updated 5 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago
- ☆14Jun 11, 2022Updated 3 years ago
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago
- Pure Python parser and analyzer for IDA Pro database files (.idb).☆484May 2, 2025Updated 9 months ago
- ☆16Aug 10, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- Run basic functions from stripped binaries cross platform☆113Dec 13, 2016Updated 9 years ago