nintendoSwitch12 / NintendoSwitchGameHackingLinks
☆47Updated last year
Alternatives and similar repositories for NintendoSwitchGameHacking
Users that are interested in NintendoSwitchGameHacking are comparing it to the libraries listed below
Sorting:
- A collection of my weggli patterns to facilitate vulnerability research.☆138Updated last month
- An intuitive query API for IDA Pro☆157Updated 3 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆51Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆259Updated 7 months ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 2 years ago
- Writeups for CTFs☆73Updated 3 weeks ago
- Practical P-Code examples☆60Updated 4 years ago
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆187Updated last month
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆62Updated 2 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆62Updated 8 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- ☆322Updated last year
- Write dynamic binary analysis tools in Python☆118Updated last month
- ☆74Updated 7 months ago
- ☆90Updated 2 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆41Updated 4 months ago
- ☆32Updated 3 years ago
- Make your Ghidra Lazy!☆152Updated 4 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- ☆45Updated last year
- A Pythonic Ghidra standard library☆172Updated 2 months ago
- ☆63Updated 4 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆82Updated 2 years ago
- ☆57Updated 2 years ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- Binary Type Inference Ghidra Plugin☆164Updated last year