rcoh / stacksmashLinks
A collection of toy programs for teaching buffer overflow vulnerabilities.
☆55Updated 9 years ago
Alternatives and similar repositories for stacksmash
Users that are interested in stacksmash are comparing it to the libraries listed below
Sorting:
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- ☆138Updated 7 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- ☆15Updated 9 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- ☆36Updated 12 years ago
- ☆38Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- an open source toolkit for PCI bus exploration☆71Updated 8 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- ☆38Updated 12 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- Collection of scripts for radare2☆27Updated 6 years ago
- ☆17Updated 7 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- Multiple radare2 rpipe scripts☆61Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- ☆24Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- A simple web based tool for working with assembly / disassembly☆89Updated 6 months ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago