Improving reliability since 2016
☆44Feb 15, 2017Updated 9 years ago
Alternatives and similar repositories for fuckitLLVM
Users that are interested in fuckitLLVM are comparing it to the libraries listed below
Sorting:
- A Spanish translation for the videogame CrossCode☆14Dec 21, 2024Updated last year
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- A JavaScript-based compiler for RGBDS GameBoy assembly syntax variants.☆14Jan 15, 2026Updated last month
- ROP database plugin for IDA☆32Jun 5, 2018Updated 7 years ago
- A VIM plugin to make life feasible in the presence of space-hippies.☆20Jul 31, 2019Updated 6 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 9 months ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- ☆15Aug 17, 2021Updated 4 years ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- Extract and generate code based on name and type for mig func/arg/request&reply member etc, ideal helper for creating monitor, tracker, f…☆19Jun 5, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- Ghidra loader for decrypted iBoot, LLB, iBEC, iBSS and SecureROM images☆23Mar 25, 2022Updated 3 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Covers an image to braille unicode☆15Feb 11, 2016Updated 10 years ago
- Build a working Ghidra application for macOS☆22Oct 30, 2025Updated 4 months ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Serializer and Deserializer adapters that avoid stack overflows by dynamically growing the stack☆37Jan 25, 2026Updated last month
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Aug 22, 2018Updated 7 years ago
- WTF Snapshot fuzzing of macOS targets☆98May 31, 2024Updated last year
- Alfred Workflow to convert hex string to assembly and vice versa☆24Dec 12, 2016Updated 9 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- My collection of PoCs☆26Nov 9, 2023Updated 2 years ago
- ☆74Jan 25, 2018Updated 8 years ago