radareorg / r2con2020Links
☆37Updated 4 years ago
Alternatives and similar repositories for r2con2020
Users that are interested in r2con2020 are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- The Dumb Network Fuzzer☆21Updated 2 years ago
- ☆20Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- SSD Challenges☆47Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- #INFILTRATE20 raptor's party pack.☆29Updated last year
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Simple rust fuzzer☆23Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 3 months ago
- Reverse engineering challenges☆52Updated 5 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Ghidra plugin to communicate with radare2☆59Updated last week
- ☆28Updated 3 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Corewars but within r2☆59Updated last year