radareorg / r2con2021Links
☆28Updated 3 years ago
Alternatives and similar repositories for r2con2021
Users that are interested in r2con2021 are comparing it to the libraries listed below
Sorting:
- ☆78Updated 6 months ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- ☆18Updated 5 years ago
- The Dumb Network Fuzzer☆21Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 8 months ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- My talks and papers☆37Updated 2 months ago
- ☆48Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- A collection of various exploits☆29Updated 11 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆28Updated 10 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago