☆92Oct 24, 2018Updated 7 years ago
Alternatives and similar repositories for r2con2018
Users that are interested in r2con2018 are comparing it to the libraries listed below
Sorting:
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- High Level API on top of the R2Pipe interface☆44Nov 15, 2025Updated 3 months ago
- ☆37Jun 7, 2019Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Sniffing on port messages☆28Nov 2, 2016Updated 9 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135May 14, 2021Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- poc for cve-2017-10661☆11Aug 11, 2017Updated 8 years ago
- ☆41Nov 20, 2017Updated 8 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Transfer analysis data between Binary Ninja and IDA☆139Oct 16, 2025Updated 4 months ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- ☆429May 16, 2021Updated 4 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Radare2 plugin to parse modern iOS 64-bit kernel caches☆28Mar 10, 2019Updated 6 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 5 years ago
- BSides Munich Frida Workshop 2018☆48Aug 8, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,846Feb 25, 2025Updated last year
- IDA Pro plugin to assist with complex graphs☆322Apr 10, 2023Updated 2 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- a simple frida-based fuzzer for skylight based on @ret2systems pwn2own work☆30May 19, 2019Updated 6 years ago
- ☆97Jan 9, 2021Updated 5 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Jul 22, 2020Updated 5 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- r2con2019 - slides and materials☆137Feb 19, 2020Updated 6 years ago