petroav / CMU-assembly-challenge
This is my walkthrough for the CMU binary bomb challenge
☆15Updated 9 years ago
Alternatives and similar repositories for CMU-assembly-challenge:
Users that are interested in CMU-assembly-challenge are comparing it to the libraries listed below
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago
- Papers on reverse engineering and assembly language programming☆38Updated 4 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 3 months ago
- STAN is a sTAtic aNalyser☆39Updated 7 years ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆42Updated 15 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- Slides and very basic examples☆111Updated 7 years ago
- ☆35Updated 12 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- ☆72Updated 6 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Binary ninja plugins☆16Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 2 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Routines for hunting down kernel symbols.☆82Updated 13 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- ☆92Updated 6 years ago
- This repository contains a docker container dedicated to reverse engineering☆83Updated 6 years ago
- ☆25Updated 6 years ago