nativeflow / pwntexLinks
☆17Updated 11 years ago
Alternatives and similar repositories for pwntex
Users that are interested in pwntex are comparing it to the libraries listed below
Sorting:
- ☆28Updated 3 years ago
- ☆25Updated 7 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- ☆16Updated 9 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Updated 9 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆18Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- ☆32Updated 7 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- Windows Kernel Dump Analyzer☆15Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- ☆49Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- ☆27Updated 9 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 12 years ago
- ☆31Updated 9 years ago
- ☆51Updated 8 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- ☆23Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago