monosource / radare2-explorations-binariesLinks
Supplement to radare2-explorations.
☆33Updated 8 years ago
Alternatives and similar repositories for radare2-explorations-binaries
Users that are interested in radare2-explorations-binaries are comparing it to the libraries listed below
Sorting:
- A reversing series with radare2☆48Updated 8 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆44Updated 6 years ago
- Radare 2 wiki☆92Updated 5 years ago
- SIGSTOPing ELF binaries since 0x7E1☆53Updated 9 months ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 3 years ago
- A book on learning radare2.☆47Updated 4 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- ☆92Updated 6 years ago
- ☆49Updated 7 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- ☆36Updated 12 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- ☆38Updated 9 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆118Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ☆38Updated 12 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- Routines for hunting down kernel symbols.☆82Updated 14 years ago
- ELF header abuse☆48Updated 9 years ago
- Programmatic disassembly and patching☆68Updated 8 years ago