monosource / radare2-explorations-binariesLinks
Supplement to radare2-explorations.
☆34Updated 9 years ago
Alternatives and similar repositories for radare2-explorations-binaries
Users that are interested in radare2-explorations-binaries are comparing it to the libraries listed below
Sorting:
- A reversing series with radare2☆50Updated 9 years ago
- A book on learning radare2.☆48Updated 5 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- ☆49Updated 7 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Radare2 cheat-sheet☆113Updated 7 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- Radare 2 wiki☆93Updated 5 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 13 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆135Updated 6 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Updated 7 years ago
- ☆34Updated 9 years ago
- A Python tool to generate ROP chains☆65Updated 11 months ago
- CTF writeups☆13Updated 8 years ago
- sample linux x86_64 ELF virus☆54Updated 7 years ago
- ☆92Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆52Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- quals-2014☆21Updated 11 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- ☆91Updated last year