random brain dumps
☆350Jul 17, 2017Updated 8 years ago
Alternatives and similar repositories for cheatsheets
Users that are interested in cheatsheets are comparing it to the libraries listed below
Sorting:
- This project has been moved to:☆1,459Apr 7, 2021Updated 4 years ago
- Multiple radare2 rpipe scripts☆61Nov 6, 2017Updated 8 years ago
- ☆280May 21, 2020Updated 5 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,281Oct 7, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- LLDB MCP Integration + other helpful commands☆740Mar 29, 2025Updated 11 months ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,063Aug 31, 2021Updated 4 years ago
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,626Oct 2, 2018Updated 7 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- ☆137Mar 29, 2018Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,107Jul 29, 2024Updated last year
- ☆351Sep 4, 2015Updated 10 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Mar 1, 2019Updated 7 years ago
- UNIX-like reverse engineering framework and command-line toolset☆23,170Updated this week
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Feb 9, 2017Updated 9 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Some helpful preload libraries for pwning stuff.☆1,646May 22, 2025Updated 9 months ago
- Documentation for the angr suite☆848Apr 27, 2023Updated 2 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆303Jan 12, 2023Updated 3 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Sep 27, 2017Updated 8 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,377Dec 16, 2025Updated 2 months ago
- A shellcode writing toolkit☆685Jun 30, 2025Updated 8 months ago
- ☆92Aug 18, 2024Updated last year
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Oct 10, 2014Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A powerful and user-friendly binary analysis platform!☆8,517Updated this week
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago