quanyang / reversing-workshop
☆33Updated 8 years ago
Alternatives and similar repositories for reversing-workshop:
Users that are interested in reversing-workshop are comparing it to the libraries listed below
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆34Updated 9 years ago
- ☆39Updated 4 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆86Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆49Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- Collection of pin tools☆52Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- exploit development☆49Updated 7 years ago
- ☆28Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- ☆26Updated 8 years ago
- ☆91Updated 5 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- A Python tool to generate ROP chains☆63Updated 3 months ago
- ☆21Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- Simple reporting plugin for binary ninja☆16Updated 6 years ago