o-o-overflow / dc2020q-mooodem-publicLinks
old school bbs system, with a bell 202 style modem frontend
☆12Updated 5 years ago
Alternatives and similar repositories for dc2020q-mooodem-public
Users that are interested in dc2020q-mooodem-public are comparing it to the libraries listed below
Sorting:
- A PCode Emulator for Ghidra.☆109Updated 4 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 8 months ago
- ☆188Updated 6 months ago
- Ghidra Emulates Functions☆55Updated 5 years ago
- ☆135Updated 4 years ago
- ☆11Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆124Updated 8 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆155Updated 4 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆152Updated last year
- ☆163Updated 4 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆27Updated 6 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆303Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 8 months ago
- Kernel exploits and writeups☆17Updated 3 years ago
- ☆186Updated 8 months ago
- Source code of HAL-fuzz☆154Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆192Updated last year
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆125Updated 4 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆154Updated 7 years ago
- Apply IDA FLIRT signatures for Ghidra☆205Updated 5 years ago
- ☆48Updated 3 years ago
- Old and new CTFs about Linux kernel exploitation.☆60Updated 3 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆89Updated 6 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆94Updated 2 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- The new phuzzing framework!☆160Updated last year
- Code and exercises for a workshop on z3 and angr☆230Updated 4 years ago