Radare Congress Stuff
☆214Oct 26, 2025Updated 4 months ago
Alternatives and similar repositories for r2con
Users that are interested in r2con are comparing it to the libraries listed below
Sorting:
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- My slides☆89Nov 4, 2019Updated 6 years ago
- some vul☆789Apr 25, 2025Updated 10 months ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Feb 9, 2017Updated 9 years ago
- ☆36Apr 1, 2021Updated 4 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆930Nov 15, 2021Updated 4 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,846Feb 25, 2025Updated last year
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- ☆522Feb 22, 2020Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Nov 18, 2019Updated 6 years ago
- The third MOSEC mobile security technology summit 第三届 MOSEC 移动安全技术峰会参会分享☆186Jul 7, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- ☆478Mar 31, 2018Updated 7 years ago
- Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.☆1,299Jun 29, 2023Updated 2 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- Symbolic Execution Tool in r2☆106Jan 21, 2022Updated 4 years ago
- Reverse engineering framework in Python☆3,828Jan 26, 2025Updated last year
- ☆28Oct 4, 2021Updated 4 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,098Feb 28, 2025Updated last year
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆303Jan 12, 2023Updated 3 years ago
- JNI Helper Plugin☆54Dec 5, 2024Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,281Oct 7, 2022Updated 3 years ago
- ☆91Jun 23, 2016Updated 9 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- ☆121Apr 1, 2018Updated 7 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago