ps1337 / pwntools-r2Links
Launch radare2 like a boss from pwntools in tmux
☆26Updated 5 years ago
Alternatives and similar repositories for pwntools-r2
Users that are interested in pwntools-r2 are comparing it to the libraries listed below
Sorting:
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 2 months ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Ghidra plugin to communicate with radare2☆54Updated this week
- Backwards program slice stitching for automatic CTF problem solving.☆52Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- Use Ghidra Structs in Python☆30Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- ☆31Updated 3 months ago
- Basic BIOS emulator for Unicorn Engine.☆99Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- various CTF writeups☆60Updated 7 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- ☆30Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆110Updated 5 years ago
- A library for patching ELFs☆57Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago