n01e0 / pRETzel_logic
LLVM-based ROP obfuscated compiler
☆13Updated 2 years ago
Alternatives and similar repositories for pRETzel_logic:
Users that are interested in pRETzel_logic are comparing it to the libraries listed below
- My challenges for SECCON CTF 2022 Finals☆17Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆45Updated 2 years ago
- Dark+ Theme☆48Updated 10 months ago
- IDAPython / IDC tips and tricks☆37Updated 2 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- ☆18Updated 3 years ago
- ☆20Updated 2 years ago
- small projects, exercises, poc's that'll be used once or twice☆13Updated last week
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- my writeups (mainly pwnable)☆33Updated 5 months ago
- ☆23Updated last year
- IDAPython project for Hex-Ray's IDA Pro☆15Updated 3 months ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 6 months ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆24Updated 9 months ago
- IDA (sort of) headless☆23Updated last year
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- Fork of Synacktiv's private Lumina server☆21Updated 3 years ago
- Repo for talk slides & materials☆16Updated 3 months ago
- File permission and SIP misbehaviour hunter☆13Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- Proof-of-Concept of exploits that may be published☆20Updated 4 months ago
- Proof of Concept of TrustZone exploit☆16Updated 5 years ago
- ☆80Updated 2 years ago
- First level taint implementation with qemu for linux user mode☆26Updated 4 years ago
- Go fastcall analysis for ida decompiler☆31Updated 2 weeks ago
- Binary exploitation by confusing the unwinder☆59Updated 2 years ago
- linux kernel cross page attack demo module☆30Updated 2 years ago