rootkiter / Reverse-bins
Same code , different CPU case , different build case , Iot bins reverse learning.
☆27Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Reverse-bins
- ☆29Updated 6 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 6 years ago
- ☆17Updated 9 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆64Updated 3 years ago
- Useful tools for writing shellcode☆66Updated 4 years ago
- Volatility Linux Profiles☆26Updated 10 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- 物联网设备分析环境搭建与工具使用,包括脚本换阿里源、binwalk的完整安装、firmwalker和rips的使用☆42Updated 6 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Updated 7 years ago
- Some CVE resources☆25Updated 5 years ago
- ☆23Updated 3 years ago
- a pwn demo for easy manage a pwn server☆25Updated 8 years ago
- plugin of ida with pin☆48Updated 3 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Updated 8 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆13Updated 2 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 4 years ago
- ☆78Updated 6 years ago
- slides☆9Updated 3 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Updated 6 years ago
- A collection of pwn execrise☆28Updated 5 years ago
- Vulnerabilitys for D-Link Router☆5Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 7☆14Updated 6 years ago
- ☆41Updated 7 years ago
- snmp_fuzzer☆23Updated 5 years ago
- embedded-device-lab是一个利用qemu模拟真实世界中物联网漏洞的测试环境。由于物联网架构的特殊性,调试分析漏洞通常需要使用qemu模拟执行不同架构的可执行文件。而各种搭建环境,交叉编译是一件费事费力,令人忧伤的工作。 embedded-device-la…☆56Updated 6 years ago