radareorg / r2con2020Links
☆37Updated 4 years ago
Alternatives and similar repositories for r2con2020
Users that are interested in r2con2020 are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- SSD Challenges☆47Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- ☆20Updated 3 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆28Updated 3 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 2 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 4 months ago
- ☆49Updated 4 years ago
- tools for shellcoding☆56Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Simple rust fuzzer☆23Updated 4 years ago
- ☆20Updated 5 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆89Updated 3 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Reverse engineering challenges☆51Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A library for patching ELFs☆57Updated 4 years ago
- ☆13Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago