☆17Aug 20, 2014Updated 11 years ago
Alternatives and similar repositories for pwntex
Users that are interested in pwntex are comparing it to the libraries listed below
Sorting:
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;☆13Jan 1, 2016Updated 10 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- Unlock security module, obtain root privilege and so on.☆52Apr 10, 2016Updated 9 years ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- CVE-2014-3153 aka towelroot☆123Apr 25, 2017Updated 8 years ago
- ☆74Nov 22, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago