quanyang / reversing-workshopLinks
☆33Updated 8 years ago
Alternatives and similar repositories for reversing-workshop
Users that are interested in reversing-workshop are comparing it to the libraries listed below
Sorting:
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- ☆91Updated 6 years ago
- exploit development☆49Updated 7 years ago
- ☆39Updated 4 years ago
- ☆28Updated 8 years ago
- ☆35Updated 10 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 8 months ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Collection of pin tools☆52Updated 9 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆93Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- A fuzz job for ClamAV☆32Updated 9 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ☆49Updated 7 years ago
- Tool to view heap chunks and memory writes (using pintool)☆41Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- ☆45Updated 7 years ago
- ☆43Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago