rapid7 / rex-bin_toolsLinks
Created by David Maloney via the GitHub Connector
☆12Updated 5 months ago
Alternatives and similar repositories for rex-bin_tools
Users that are interested in rex-bin_tools are comparing it to the libraries listed below
Sorting:
- Exploitation challenges for CTF☆63Updated 7 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- Frida script to bypass ssl Pinning☆45Updated 3 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- ☆21Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- HP printer security research code☆55Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 4 years ago
- Network based protocol fuzzer☆75Updated 3 years ago
- ☆15Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- ☆43Updated 7 years ago
- ☆73Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- PyCommands for Immunity Debugger☆29Updated 12 years ago
- Vulnerability Reports by Aleph Research☆35Updated last year
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Updated 8 years ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- Fighting String Encryption in Android Malware☆59Updated 3 years ago