mwkmwkmwk / cpuadventure2
CPU Adventure 2 challenge from the Dragon CTF 2019
☆16Updated 4 years ago
Alternatives and similar repositories for cpuadventure2:
Users that are interested in cpuadventure2 are comparing it to the libraries listed below
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Updated 5 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated 11 months ago
- Use Ghidra Structs in Python☆28Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆40Updated 5 years ago
- Exploit generator for Intel ME 11 buffer overflow☆32Updated 5 years ago
- ☆28Updated 5 years ago
- ☆27Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- 802.15.4 Fuzzer☆21Updated 5 years ago
- ☆16Updated 5 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆23Updated 4 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- CTF Challenge problem made for NES hackers☆10Updated 5 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Gave a talk on Vectorized emulation at Recon Montreal 2019, here are the slides☆16Updated 5 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 7 years ago
- The slides from my Saintcon 2019 talk.☆48Updated 4 years ago
- Python repository containing parsed standard C library function and argument information☆26Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆25Updated 5 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 8 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆43Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago