radareorg / r2conLinks
Radare Congress Stuff
☆210Updated 7 months ago
Alternatives and similar repositories for r2con
Users that are interested in r2con are comparing it to the libraries listed below
Sorting:
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- Scripts for Binary Ninja☆256Updated 2 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Release Branches for MoFlow☆304Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆228Updated 9 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆242Updated 5 years ago
- ☆163Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- r2con 2017 September 6-9☆97Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Slides and very basic examples☆111Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- ☆235Updated 7 years ago
- GATEKEEPER: Inline and on-target defense☆120Updated 2 years ago
- Repository to train/learn memory corruption on the ARM platform.☆354Updated 8 years ago
- ☆85Updated 5 years ago
- Radare 2 wiki☆93Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- An evolutionary knowledge-based fuzzer☆271Updated last year
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 6 years ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 7 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆358Updated 5 years ago
- Cross Architecture Shellcode in C☆201Updated 8 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago