Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools
☆39Mar 16, 2017Updated 8 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- ☆14Dec 9, 2015Updated 10 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- ☆92Aug 18, 2024Updated last year
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- ☆15Oct 27, 2015Updated 10 years ago