radareorg / r2con2020Links
☆36Updated 4 years ago
Alternatives and similar repositories for r2con2020
Users that are interested in r2con2020 are comparing it to the libraries listed below
Sorting:
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- SSD Challenges☆48Updated 3 years ago
- ☆21Updated 4 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- ☆21Updated last year
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- Ghidra plugin to communicate with radare2☆68Updated 2 months ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 3 months ago
- An automated setup for fuzzing Redis w/ AFL++☆35Updated 3 years ago
- ☆28Updated 4 years ago
- ☆13Updated 5 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- ☆49Updated 5 years ago
- Corewars but within r2☆60Updated last year
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- #INFILTRATE20 raptor's party pack.☆30Updated 3 months ago