radareorg / r2con2019
r2con2019 - slides and materials
☆135Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for r2con2019
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- ☆88Updated 5 years ago
- ☆133Updated 4 years ago
- The slides from my Saintcon 2019 talk.☆48Updated 4 years ago
- Make ARM Shellcode Great Again☆61Updated 3 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- ☆100Updated 6 years ago
- ☆86Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆130Updated 5 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆53Updated 6 years ago
- ☆85Updated 2 years ago
- VerSprite Security Research☆163Updated last year
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆88Updated 5 years ago
- Mobile security trainings based on android☆103Updated 4 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆49Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 3 months ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆136Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- GDB + GEF cheatsheet for reversing binaries☆68Updated last year
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆35Updated 4 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 2 years ago
- ☆121Updated 6 years ago
- SSD Secure Disclosure Advisories☆167Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- A tool for checking exploitability☆210Updated 5 years ago