radareorg / r2warsLinks
Corewars but within r2
☆58Updated last year
Alternatives and similar repositories for r2wars
Users that are interested in r2wars are comparing it to the libraries listed below
Sorting:
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆49Updated 4 months ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Launch radare2 like a boss from pwntools in tmux☆26Updated 5 years ago
- Radare 2 wiki☆93Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Fork Free Fail Repeat☆49Updated 3 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Binary Golf Library☆62Updated 4 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Updated 5 years ago
- ☆37Updated 4 years ago
- Challenges where you can practice heap tecnics☆23Updated 7 years ago
- Angr integration with Cutter's debugger☆36Updated 5 years ago
- HTML-embeddable x86_64 emulator☆78Updated 4 months ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ☆27Updated 6 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- My customized docker image used for binary exploitation and RE☆14Updated 3 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- shell for nasm☆64Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Exploitation on ARM-based Systems (Troopers18)☆148Updated 7 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago